##
Updated at UTC 2025-07-01T03:06:51.932334
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-49521 | 8.8 | 0.00% | 2 | 0 | 2025-07-01T02:15:22.310000 | A flaw was found in the EDA component of the Ansible Automation Platform, where | |
| CVE-2025-49520 | 8.8 | 0.00% | 2 | 0 | 2025-07-01T02:15:22.190000 | A flaw was found in Ansible Automation Platform’s EDA component where user-suppl | |
| CVE-2025-6543 | 0 | 0.06% | 16 | 2 | 2025-07-01T01:00:02.237000 | Memory overflow vulnerability leading to unintended control flow and Denial of S | |
| CVE-2025-6824 | 8.8 | 0.14% | 2 | 0 | 2025-07-01T00:33:14.560000 | A vulnerability classified as critical has been found in TOTOLINK X15 up to 1.0. | |
| CVE-2025-26074 | 9.8 | 0.00% | 2 | 0 | 2025-06-30T22:16:54 | Orkes Conductor v3.21.11 allows remote attackers to execute arbitrary OS command | |
| CVE-2025-6554 | 0 | 0.00% | 3 | 0 | 2025-06-30T22:15:29.873000 | Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote at | |
| CVE-2025-45931 | 9.8 | 0.00% | 2 | 0 | 2025-06-30T21:31:52 | An issue D-Link DIR-816-A2 DIR-816A2_FWv1.10CNB05_R1B011D88210 allows a remote a | |
| CVE-2025-32462 | 2.8 | 0.00% | 7 | 0 | 2025-06-30T21:30:54 | Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that i | |
| CVE-2025-5730 | 4.3 | 0.02% | 1 | 0 | 2025-06-30T21:30:50 | The Contact Form Plugin WordPress plugin before 1.1.29 does not sanitise and esc | |
| CVE-2025-6916 | 8.8 | 0.00% | 2 | 1 | 2025-06-30T21:15:32.730000 | A vulnerability, which was classified as critical, was found in TOTOLINK T6 4.1. | |
| CVE-2025-32463 | 9.3 | 0.00% | 7 | 0 | 2025-06-30T21:15:30.257000 | Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswi | |
| CVE-2025-47824 | 2.0 | 0.01% | 2 | 0 | 2025-06-30T18:38:48.477000 | Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have c | |
| CVE-2025-47818 | 2.2 | 0.01% | 2 | 0 | 2025-06-30T18:38:48.477000 | Flock Safety Gunshot Detection devices before 1.3 have a hard-coded password for | |
| CVE-2025-6882 | 8.8 | 0.04% | 3 | 0 | 2025-06-30T18:38:23.493000 | A vulnerability classified as critical has been found in D-Link DIR-513 1.0. Thi | |
| CVE-2025-6899 | 6.3 | 0.63% | 2 | 0 | 2025-06-30T18:38:23.493000 | A vulnerability, which was classified as critical, was found in D-Link DI-7300G+ | |
| CVE-2025-53094 | 0 | 0.04% | 2 | 0 | 2025-06-30T18:38:23.493000 | ESPAsyncWebServer is an asynchronous HTTP and WebSocket server library for ESP32 | |
| CVE-2025-53415 | 7.8 | 0.26% | 1 | 0 | 2025-06-30T18:38:23.493000 | Delta Electronics DTM Soft Project File Parsing Deserialization of Untrusted Dat | |
| CVE-2025-53391 | 9.4 | 0.01% | 2 | 0 | 2025-06-30T15:31:43 | The Debian zuluPolkit/CMakeLists.txt file for zuluCrypt through the zulucrypt_6. | |
| CVE-2025-24290 | 9.9 | 0.03% | 3 | 0 | 2025-06-30T15:30:38 | Multiple Authenticated SQL Injection vulnerabilities found in UISP Application ( | |
| CVE-2024-8419 | 7.5 | 0.15% | 1 | 0 | 2025-06-30T12:30:52 | The endpoint hosts a script that allows an unauthorized remote attacker to put t | |
| CVE-2025-6898 | 6.3 | 0.63% | 2 | 0 | 2025-06-30T09:30:30 | A vulnerability, which was classified as critical, has been found in D-Link DI-7 | |
| CVE-2025-6896 | 6.3 | 0.63% | 2 | 0 | 2025-06-30T09:30:30 | A vulnerability classified as critical has been found in D-Link DI-7300G+ 19.12. | |
| CVE-2025-6897 | 5.5 | 0.55% | 2 | 0 | 2025-06-30T09:30:30 | A vulnerability classified as critical was found in D-Link DI-7300G+ 19.12.25A1. | |
| CVE-2025-6886 | 8.8 | 0.09% | 4 | 0 | 2025-06-30T06:30:33 | A vulnerability has been found in Tenda AC5 15.03.06.47 and classified as critic | |
| CVE-2025-6887 | 8.8 | 0.09% | 3 | 0 | 2025-06-30T06:30:33 | A vulnerability was found in Tenda AC5 15.03.06.47 and classified as critical. A | |
| CVE-2025-6881 | 8.8 | 0.04% | 2 | 0 | 2025-06-30T03:30:39 | A vulnerability was found in D-Link DI-8100 16.07.21. It has been rated as criti | |
| CVE-2025-6019 | 7.0 | 0.02% | 3 | 3 | 2025-06-30T03:15:25.990000 | A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Gener | |
| CVE-2025-6825 | 8.8 | 0.14% | 2 | 0 | 2025-06-28T21:30:35 | A vulnerability classified as critical was found in TOTOLINK A702R up to 4.0.0-B | |
| CVE-2025-45729 | 6.3 | 0.03% | 2 | 0 | 2025-06-27T21:31:30 | D-Link DIR-823-Pro 1.02 has improper permission control, allowing unauthorized u | |
| CVE-2025-6619 | 6.3 | 1.94% | 2 | 0 | 2025-06-27T18:31:47 | A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been declared a | |
| CVE-2025-6620 | 6.3 | 1.94% | 2 | 0 | 2025-06-27T18:31:47 | A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as c | |
| CVE-2025-6618 | 6.3 | 1.94% | 2 | 0 | 2025-06-27T18:31:47 | A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been classified | |
| CVE-2025-49853 | 9.1 | 0.05% | 1 | 0 | 2025-06-27T18:31:47 | ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to SQL | |
| CVE-2025-6522 | 5.4 | 0.03% | 2 | 0 | 2025-06-27T18:30:51 | Unauthenticated users on an adjacent network with the Sight Bulb Pro can run sh | |
| CVE-2025-6621 | 6.3 | 1.94% | 2 | 0 | 2025-06-27T18:10:30.697000 | A vulnerability classified as critical has been found in TOTOLINK CA300-PoE 6.2c | |
| CVE-2024-54085 | 9.8 | 9.47% | 3 | 1 | 2025-06-27T16:57:49.563000 | AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authe | |
| CVE-2025-6568 | 8.8 | 0.17% | 2 | 0 | 2025-06-27T16:43:42.703000 | A vulnerability classified as critical has been found in TOTOLINK EX1200T 4.1.2c | |
| CVE-2024-51978 | 9.8 | 2.05% | 5 | 1 | template | 2025-06-27T15:32:26 | An unauthenticated attacker who knows the target device's serial number, can gen |
| CVE-2025-6705 | None | 0.04% | 2 | 0 | 2025-06-27T15:31:41 | On open-vsx.org http://open-vsx.org/ it was possible to run an arbitrary build | |
| CVE-2025-3699 | 9.8 | 0.17% | 2 | 0 | 2025-06-27T12:32:20 | Missing Authentication for Critical Function vulnerability in Mitsubishi Electri | |
| CVE-2025-6751 | 8.8 | 0.08% | 2 | 0 | 2025-06-27T06:31:22 | A vulnerability, which was classified as critical, was found in Linksys E8450 up | |
| CVE-2025-6752 | 8.8 | 0.08% | 2 | 0 | 2025-06-27T06:31:22 | A vulnerability has been found in Linksys WRT1900ACS, EA7200, EA7450 and EA7500 | |
| CVE-2025-47819 | 6.4 | 0.02% | 2 | 0 | 2025-06-27T03:30:47 | Flock Safety Gunshot Detection devices before 1.3 have an on-chip debug interfac | |
| CVE-2025-47822 | 6.4 | 0.02% | 2 | 0 | 2025-06-27T03:30:47 | Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have a | |
| CVE-2025-47823 | 2.2 | 0.01% | 2 | 0 | 2025-06-27T03:30:47 | Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have a | |
| CVE-2025-47821 | 2.2 | 0.01% | 2 | 0 | 2025-06-27T03:30:47 | Flock Safety Gunshot Detection devices before 1.3 have a hardcoded password for | |
| CVE-2025-6732 | 8.8 | 0.04% | 2 | 0 | 2025-06-27T00:32:15 | A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been clas | |
| CVE-2025-6734 | 8.8 | 0.04% | 2 | 0 | 2025-06-27T00:32:15 | A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been rate | |
| CVE-2025-6627 | 8.8 | 0.14% | 2 | 0 | 2025-06-26T21:31:22 | A vulnerability has been found in TOTOLINK A702R 4.0.0-B20230721.1521 and classi | |
| CVE-2025-6616 | 8.8 | 0.08% | 2 | 0 | 2025-06-26T21:31:21 | A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as crit | |
| CVE-2025-36038 | 9.1 | 0.19% | 3 | 0 | 2025-06-26T21:31:21 | IBM WebSphere Application Server 8.5 and 9.0 could allow a remote attacker to ex | |
| CVE-2025-6617 | 8.8 | 0.08% | 2 | 0 | 2025-06-26T21:31:20 | A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. | |
| CVE-2025-20281 | 9.8 | 0.11% | 7 | 1 | 2025-06-26T21:31:20 | A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an | |
| CVE-2025-49153 | 9.8 | 0.17% | 1 | 0 | 2025-06-26T21:31:20 | MICROSENS NMP Web+ could allow an unauthenticated attacker to overwrite files a | |
| CVE-2025-6615 | 8.8 | 0.08% | 2 | 0 | 2025-06-26T21:31:13 | A vulnerability, which was classified as critical, was found in D-Link DIR-619L | |
| CVE-2025-20282 | 10.0 | 0.10% | 7 | 0 | 2025-06-26T21:31:13 | A vulnerability in an internal API of Cisco ISE and Cisco ISE-PIC could allow an | |
| CVE-2025-32977 | 9.7 | 0.02% | 2 | 0 | 2025-06-26T21:31:13 | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef | |
| CVE-2025-32978 | 7.5 | 0.06% | 2 | 0 | 2025-06-26T21:31:13 | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef | |
| CVE-2025-23264 | 7.8 | 0.02% | 1 | 0 | 2025-06-26T21:31:13 | NVIDIA Megatron-LM for all platforms contains a vulnerability in a python compon | |
| CVE-2025-49151 | 9.1 | 0.09% | 1 | 0 | 2025-06-26T21:31:13 | MICROSENS NMP Web+ could allow an unauthenticated attacker to generate forged JS | |
| CVE-2025-20264 | 6.4 | 0.05% | 1 | 0 | 2025-06-26T21:31:12 | A vulnerability in the web-based management interface of Cisco Identity Services | |
| CVE-2025-23260 | 5.0 | 0.03% | 1 | 0 | 2025-06-26T21:31:10 | NVIDIA AIStore contains a vulnerability in the AIS Operator where a user may gai | |
| CVE-2025-36537 | 7.0 | 0.01% | 3 | 0 | 2025-06-26T21:31:09 | Incorrect Permission Assignment for Critical Resource in the TeamViewer Client ( | |
| CVE-2025-34037 | None | 2.46% | 2 | 0 | 2025-06-26T21:31:08 | An OS command injection vulnerability exists in various models of E-Series Links | |
| CVE-2025-6559 | 9.8 | 0.62% | 2 | 0 | 2025-06-26T21:31:08 | Multiple wireless router models from Sapido have an OS Command Injection vulnera | |
| CVE-2025-48469 | 9.7 | 0.04% | 2 | 0 | 2025-06-26T21:31:08 | Successful exploitation of the vulnerability could allow an unauthenticated atta | |
| CVE-2025-6560 | 9.8 | 0.11% | 2 | 0 | 2025-06-26T21:31:08 | Multiple wireless router models from Sapido have an Exposure of Sensitive Inform | |
| CVE-2025-32975 | 10.0 | 0.12% | 2 | 0 | 2025-06-26T21:31:08 | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef | |
| CVE-2025-34034 | None | 0.05% | 2 | 0 | 2025-06-26T21:31:08 | A hardcoded credential vulnerability exists in the Blue Angel Software Suite dep | |
| CVE-2025-34041 | None | 1.03% | 2 | 0 | 2025-06-26T21:31:08 | An OS command injection vulnerability exists in the Chinese versions of Sangfor | |
| CVE-2024-0769 | 5.3 | 75.56% | 2 | 0 | 2025-06-26T19:29:56.650000 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06 | |
| CVE-2025-6565 | 8.8 | 0.19% | 2 | 0 | 2025-06-26T18:58:14.280000 | A vulnerability was found in Netgear WNCE3001 1.0.0.50. It has been classified a | |
| CVE-2024-56731 | 10.0 | 0.33% | 3 | 0 | 2025-06-26T18:58:14.280000 | Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's st | |
| CVE-2025-52570 | 0 | 0.06% | 2 | 0 | 2025-06-26T18:58:14.280000 | Letmein is an authenticating port knocker. Prior to version 10.2.1, The connecti | |
| CVE-2025-52562 | 10.0 | 1.48% | 2 | 0 | 2025-06-26T18:58:14.280000 | Convoy is a KVM server management panel for hosting businesses. In versions 3.9. | |
| CVE-2025-32976 | 8.8 | 0.10% | 2 | 0 | 2025-06-26T18:58:14.280000 | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef | |
| CVE-2025-23265 | 7.8 | 0.02% | 1 | 0 | 2025-06-26T18:58:14.280000 | NVIDIA Megatron-LM for all platforms contains a vulnerability in a python compon | |
| CVE-2025-49851 | 0 | 0.07% | 1 | 0 | 2025-06-26T18:58:14.280000 | ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to an | |
| CVE-2025-2566 | 0 | 0.13% | 1 | 0 | 2025-06-26T18:58:14.280000 | Kaleris NAVIS N4 ULC (Ultra Light Client) contains an unsafe Java deserializatio | |
| CVE-2025-34042 | 0 | 0.52% | 2 | 0 | 2025-06-26T18:57:43.670000 | An authenticated command injection vulnerability exists in the Beward N100 IP Ca | |
| CVE-2025-6614 | 8.8 | 0.08% | 2 | 0 | 2025-06-26T18:57:43.670000 | A vulnerability, which was classified as critical, has been found in D-Link DIR- | |
| CVE-2025-6561 | 9.8 | 0.08% | 1 | 0 | 2025-06-26T18:57:43.670000 | Certain hybrid DVR models ((HBF-09KD and HBF-16NK)) from Hunt Electronic have an | |
| CVE-2025-34043 | None | 0.32% | 2 | 0 | 2025-06-26T18:31:35 | A remote command injection vulnerability exists in Vacron Network Video Recorder | |
| CVE-2025-34049 | None | 0.50% | 2 | 0 | 2025-06-26T18:31:35 | An OS command injection vulnerability exists in the OptiLink ONT1GEW GPON router | |
| CVE-2025-6709 | 7.5 | 0.09% | 7 | 0 | 2025-06-26T18:31:35 | The MongoDB Server is susceptible to a denial of service vulnerability due to im | |
| CVE-2025-34048 | None | 0.22% | 2 | 0 | 2025-06-26T18:31:34 | A path traversal vulnerability exists in the web management interface of D-Link | |
| CVE-2025-34044 | None | 0.09% | 2 | 0 | 2025-06-26T18:31:34 | A remote command injection vulnerability exists in the confirm.php interface of | |
| CVE-2024-11584 | 5.9 | 0.01% | 1 | 0 | 2025-06-26T18:31:26 | cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.s | |
| CVE-2024-6174 | 8.8 | 0.02% | 2 | 0 | 2025-06-26T18:31:25 | When a non-x86 platform is detected, cloud-init grants root access to a hardcode | |
| CVE-2025-6336 | 8.8 | 0.17% | 1 | 0 | 2025-06-26T18:31:21 | A vulnerability was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. It has bee | |
| CVE-2025-6402 | 8.8 | 0.16% | 2 | 0 | 2025-06-25T20:14:57.620000 | A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been decl | |
| CVE-2025-6374 | 8.8 | 0.03% | 2 | 0 | 2025-06-25T20:10:23.920000 | A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. | |
| CVE-2025-6370 | 8.8 | 0.03% | 2 | 0 | 2025-06-25T20:09:39.790000 | A vulnerability classified as critical was found in D-Link DIR-619L 2.06B01. Aff | |
| CVE-2025-5087 | None | 0.02% | 1 | 0 | 2025-06-24T21:30:35 | Kaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-com | |
| CVE-2025-44531 | 7.5 | 0.05% | 2 | 0 | 2025-06-24T21:30:28 | An issue in Realtek RTL8762EKF-EVB RTL8762E SDK v1.4.0 allows attackers to cause | |
| CVE-2025-6545 | None | 0.09% | 1 | 0 | 2025-06-23T22:41:52 | ### Summary This affects both: 1. Unsupported algos (e.g. `sha3-256` / `sha3-5 | |
| CVE-2025-4563 | 2.7 | 0.02% | 2 | 0 | 2025-06-23T22:41:42 | A vulnerability exists in the NodeRestriction admission controller where nodes c | |
| CVE-2025-6400 | 8.8 | 0.17% | 2 | 0 | 2025-06-23T21:31:56 | A vulnerability was found in TOTOLINK N300RH 6.1c.1390_B20191101 and classified | |
| CVE-2025-6399 | 8.8 | 0.17% | 2 | 0 | 2025-06-23T21:31:56 | A vulnerability, which was classified as critical, was found in TOTOLINK X15 1.0 | |
| CVE-2025-6218 | 7.8 | 0.65% | 8 | 2 | 2025-06-23T21:31:55 | RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vuln | |
| CVE-2025-48706 | 9.1 | 0.06% | 1 | 0 | 2025-06-23T20:16:40.143000 | An issue was discovered in COROS PACE 3 through 3.0808.0. Due to an out-of-bound | |
| CVE-2025-49144 | 7.3 | 0.01% | 5 | 5 | 2025-06-23T20:16:21.633000 | Notepad++ is a free and open-source source code editor. In versions 8.8.1 and pr | |
| CVE-2025-49132 | 10.0 | 23.69% | 2 | 5 | template | 2025-06-23T20:16:21.633000 | Pterodactyl is a free, open-source game server management panel. Prior to versio |
| CVE-2025-6393 | 8.8 | 0.65% | 2 | 0 | 2025-06-23T20:16:21.633000 | A vulnerability was found in TOTOLINK A702R, A3002R, A3002RU and EX1200T 3.0.0-B | |
| CVE-2025-50054 | 5.5 | 0.01% | 2 | 0 | 2025-06-23T18:31:23 | Buffer overflow in OpenVPN ovpn-dco-win version 1.3.0 and earlier and version 2. | |
| CVE-2025-6511 | 8.8 | 0.19% | 2 | 0 | 2025-06-23T18:30:33 | A vulnerability classified as critical has been found in Netgear EX6150 1.0.0.46 | |
| CVE-2025-6510 | 8.8 | 0.19% | 2 | 0 | 2025-06-23T18:30:33 | A vulnerability was found in Netgear EX6100 1.0.2.28_1.1.138. It has been rated | |
| CVE-2025-6486 | 8.8 | 0.14% | 2 | 0 | 2025-06-22T18:30:39 | A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been d | |
| CVE-2025-6487 | 8.8 | 0.14% | 2 | 0 | 2025-06-22T18:30:31 | A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been r | |
| CVE-2025-6371 | 8.8 | 0.06% | 2 | 0 | 2025-06-21T00:30:38 | A vulnerability, which was classified as critical, has been found in D-Link DIR- | |
| CVE-2025-6372 | 8.8 | 0.03% | 2 | 0 | 2025-06-21T00:30:38 | A vulnerability, which was classified as critical, was found in D-Link DIR-619L | |
| CVE-2025-6368 | 8.8 | 0.03% | 2 | 0 | 2025-06-21T00:30:37 | A vulnerability was found in D-Link DIR-619L 2.06B01. It has been rated as criti | |
| CVE-2025-6373 | 8.8 | 0.03% | 2 | 0 | 2025-06-21T00:30:37 | A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as crit | |
| CVE-2025-6369 | 8.8 | 0.03% | 2 | 0 | 2025-06-21T00:30:37 | A vulnerability classified as critical has been found in D-Link DIR-619L 2.06B01 | |
| CVE-2025-34024 | None | 0.64% | 2 | 0 | 2025-06-20T21:32:14 | An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware v | |
| CVE-2025-6367 | 8.8 | 0.03% | 2 | 0 | 2025-06-20T21:32:14 | A vulnerability was found in D-Link DIR-619L 2.06B01. It has been declared as cr | |
| CVE-2025-34029 | None | 1.10% | 2 | 0 | 2025-06-20T21:32:14 | An OS command injection vulnerability exists in the Edimax EW-7438RPn Mini firmw | |
| CVE-2025-34021 | None | 0.06% | 2 | 0 | 2025-06-20T21:32:13 | A server-side request forgery (SSRF) vulnerability exists in multiple Selea Targ | |
| CVE-2025-34022 | None | 0.26% | 2 | 0 | 2025-06-20T21:32:13 | A path traversal vulnerability exists in multiple models of Selea Targa IP OCR-A | |
| CVE-2025-4981 | 10.0 | 0.23% | 1 | 0 | 2025-06-20T16:38:04 | Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7. | |
| CVE-2025-33117 | 9.1 | 0.06% | 1 | 0 | 2025-06-19T18:31:56 | IBM QRadar SIEM 7.5 through 7.5.0 Update Package 12 could allow a privileged us | |
| CVE-2025-20260 | 9.8 | 0.14% | 1 | 0 | 2025-06-18T18:30:39 | A vulnerability in the PDF scanning processes of ClamAV could allow an unauthent | |
| CVE-2025-49825 | 9.8 | 0.24% | 3 | 0 | 2025-06-18T13:46:52.973000 | Teleport provides connectivity, authentication, access controls and audit for in | |
| CVE-2025-5777 | None | 0.06% | 13 | 2 | 2025-06-17T15:31:16 | Insufficient input validation leading to memory overread on the NetScaler Manage | |
| CVE-2025-5349 | None | 0.03% | 2 | 0 | 2025-06-17T15:31:16 | Improper access control on the NetScaler Management Interface in NetScaler ADC a | |
| CVE-2023-33538 | 8.8 | 90.63% | 1 | 2 | 2025-06-16T21:32:22 | TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to | |
| CVE-2025-36852 | None | 0.04% | 1 | 0 | 2025-06-10T21:31:31 | A critical security vulnerability exists in remote cache extensions for common b | |
| CVE-2024-47081 | 5.3 | 0.06% | 1 | 0 | 2025-06-09T19:06:12 | ### Impact Due to a URL parsing issue, Requests releases prior to 2.32.4 may le | |
| CVE-2025-20130 | 4.9 | 0.04% | 1 | 0 | 2025-06-04T18:31:04 | A vulnerability in the API of Cisco Identity Services Engine (ISE) and Cisco ISE | |
| CVE-2025-4322 | 9.8 | 24.99% | 1 | 3 | template | 2025-05-20T06:32:23 | The Motors theme for WordPress is vulnerable to privilege escalation via account |
| CVE-2024-6839 | 4.3 | 0.05% | 1 | 0 | 2025-05-17T18:57:13 | corydolphin/flask-cors version 5.0.1 contains an improper regex path matching vu | |
| CVE-2024-6866 | 5.3 | 0.05% | 1 | 0 | 2025-05-17T18:55:58 | corydolphin/flask-cors version 5.0.1 contains a vulnerability where the request | |
| CVE-2025-4679 | 6.5 | 0.05% | 2 | 0 | 2025-05-16T09:30:42 | A vulnerability in Synology Active Backup for Microsoft 365 allows remote authen | |
| CVE-2025-0133 | None | 2.10% | 1 | 4 | template | 2025-05-14T21:31:25 | A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gatew |
| CVE-2025-4428 | 7.2 | 21.12% | 1 | 2 | 2025-05-13T18:30:59 | Remote Code Execution in API component in Ivanti Endpoint Manager Mobile 12.5.0. | |
| CVE-2025-1087 | 0 | 0.21% | 1 | 0 | 2025-05-12T17:32:32.760000 | Kong Insomnia Desktop Application before 11.0.2 contains a template injection vu | |
| CVE-2025-3248 | 9.8 | 92.36% | 2 | 18 | template | 2025-05-07T16:24:00.917000 | Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/ |
| CVE-2025-36558 | 6.1 | 0.06% | 1 | 0 | 2025-05-02T15:31:52 | KUNBUS PiCtory version 2.11.1 and earlier are vulnerable to a cross-site-scripti | |
| CVE-2025-35996 | 9.1 | 0.09% | 1 | 0 | 2025-05-02T15:31:45 | KUNBUS PiCtory version 2.11.1 and earlier are vulnerable when an authenticated r | |
| CVE-2025-32011 | 9.8 | 0.32% | 1 | 0 | 2025-05-02T13:52:51.693000 | KUNBUS PiCtory versions 2.5.0 through 2.11.1 have an authentication bypass vulne | |
| CVE-2022-22965 | 9.8 | 94.46% | 1 | 99 | template | 2025-04-10T16:56:46.083000 | A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t |
| CVE-2021-40870 | 9.8 | 94.26% | 1 | 4 | template | 2025-04-03T19:15:43.560000 | An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestr |
| CVE-2025-1974 | 9.8 | 87.05% | 1 | 22 | template | 2025-03-25T15:10:16 | A security issue was discovered in Kubernetes where under certain conditions, an |
| CVE-2024-6844 | 5.3 | 0.05% | 1 | 0 | 2025-03-20T10:15:34.120000 | A vulnerability in corydolphin/flask-cors version 4.0.1 allows for inconsistent | |
| CVE-2025-1767 | 6.5 | 0.04% | 1 | 0 | 2025-03-13T21:15:43.127000 | This CVE only affects Kubernetes clusters that utilize the in-tree gitRepo volum | |
| CVE-2022-23854 | 7.5 | 92.61% | 1 | 0 | template | 2025-02-13T17:15:38.600000 | AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a pat |
| CVE-2025-0055 | 6.0 | 0.02% | 2 | 0 | 2025-01-14T03:31:48 | SAP GUI for Windows stores user input on the client PC to improve usability. Und | |
| CVE-2025-0056 | 6.0 | 0.02% | 2 | 0 | 2025-01-14T01:15:15.730000 | SAP GUI for Java saves user input on the client PC to improve usability. An atta | |
| CVE-2024-39931 | 10.0 | 1.37% | 2 | 0 | 2024-12-23T20:38:21 | ### Impact Unprivileged user accounts can execute arbitrary commands on the Gog | |
| CVE-2023-36934 | 9.1 | 91.69% | 2 | 0 | template | 2024-11-21T08:10:57.087000 | In Progress MOVEit Transfer before 2020.1.11 (12.1.11), 2021.0.9 (13.0.9), 2021. |
| CVE-2023-27034 | 9.8 | 89.82% | 1 | 0 | template | 2024-11-21T07:52:12.807000 | PrestaShop jmsblog 2.5.5 was discovered to contain a SQL injection vulnerability |
| CVE-2020-1938 | 9.8 | 94.47% | 1 | 38 | template | 2024-07-25T13:37:10 | When using the Apache JServ Protocol (AJP), care must be taken when trusting inc |
| CVE-2023-0386 | 7.8 | 57.63% | 2 | 14 | 2024-06-27T12:30:43 | A flaw was found in the Linux kernel, where unauthorized access to the execution | |
| CVE-2019-6693 | 6.5 | 76.49% | 2 | 3 | 2024-04-11T21:02:46 | Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS config | |
| CVE-2023-32243 | 9.8 | 92.83% | 1 | 11 | template | 2024-04-04T05:42:42 | Improper Authentication vulnerability in WPDeveloper Essential Addons for Elemen |
| CVE-2023-34362 | 9.8 | 94.48% | 2 | 11 | template | 2024-04-04T04:29:06 | In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0. |
| CVE-2023-28771 | 9.8 | 94.35% | 3 | 2 | 2024-04-04T03:40:24 | Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.6 | |
| CVE-2023-20198 | 10.0 | 94.03% | 1 | 30 | template | 2024-02-03T05:07:29 | Cisco is aware of active exploitation of a previously unknown vulnerability in t |
| CVE-2021-43798 | 7.5 | 94.33% | 1 | 50 | template | 2024-02-01T00:16:10 | Today we are releasing Grafana 8.3.1, 8.2.7, 8.1.8, 8.0.7. This patch release in |
| CVE-2021-40444 | 7.8 | 94.29% | 1 | 42 | 2024-01-06T05:06:00 | Microsoft MSHTML Remote Code Execution Vulnerability | |
| CVE-2019-17382 | 9.1 | 93.69% | 1 | 1 | template | 2023-08-31T05:03:29 | An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zab |
| CVE-2016-3510 | 9.8 | 93.06% | 1 | 4 | template | 2023-02-02T05:03:21 | Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusi |
| CVE-2021-28164 | 5.3 | 93.52% | 1 | 1 | template | 2023-02-01T05:05:22 | Release 9.4.37 introduced a more precise implementation of [RFC3986](https://too |
| CVE-2021-40822 | 7.5 | 92.00% | 1 | 1 | template | 2023-02-01T05:00:52 | GeoServer through 2.18.5 and 2.19.x through 2.19.2 allows SSRF via the option fo |
| CVE-2025-47812 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2025-1234 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-53091 | 0 | 0.07% | 1 | 0 | N/A | ||
| CVE-2024-21969 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-48703 | 0 | 0.00% | 2 | 2 | N/A | ||
| CVE-2025-52566 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2025-6018 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2025-52464 | 0 | 0.06% | 1 | 0 | N/A |
updated 2025-07-01T02:15:22.310000
2 posts
Post-auth sev:HIGH code injection and argument injection vulns in Ansible Automation Platform.
A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the EDA worker. In Kubernetes/OpenShift environments, this can lead to service account token theft and cluster access.
https://bugzilla.redhat.com/show_bug.cgi?id=2370812
https://nvd.nist.gov/vuln/detail/CVE-2025-49520
##A flaw was found in the EDA component of the Ansible Automation Platform, where user-supplied Git branch or refspec values are evaluated as Jinja2 templates. This vulnerability allows authenticated users to inject expressions that execute commands or access sensitive files on the EDA worker. In OpenShift, it can lead to service account token theft.
Post-auth sev:HIGH code injection and argument injection vulns in Ansible Automation Platform.
A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the EDA worker. In Kubernetes/OpenShift environments, this can lead to service account token theft and cluster access.
https://bugzilla.redhat.com/show_bug.cgi?id=2370812
https://nvd.nist.gov/vuln/detail/CVE-2025-49520
##A flaw was found in the EDA component of the Ansible Automation Platform, where user-supplied Git branch or refspec values are evaluated as Jinja2 templates. This vulnerability allows authenticated users to inject expressions that execute commands or access sensitive files on the EDA worker. In OpenShift, it can lead to service account token theft.
updated 2025-07-01T02:15:22.190000
2 posts
Post-auth sev:HIGH code injection and argument injection vulns in Ansible Automation Platform.
A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the EDA worker. In Kubernetes/OpenShift environments, this can lead to service account token theft and cluster access.
https://bugzilla.redhat.com/show_bug.cgi?id=2370812
https://nvd.nist.gov/vuln/detail/CVE-2025-49520
##A flaw was found in the EDA component of the Ansible Automation Platform, where user-supplied Git branch or refspec values are evaluated as Jinja2 templates. This vulnerability allows authenticated users to inject expressions that execute commands or access sensitive files on the EDA worker. In OpenShift, it can lead to service account token theft.
Post-auth sev:HIGH code injection and argument injection vulns in Ansible Automation Platform.
A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the EDA worker. In Kubernetes/OpenShift environments, this can lead to service account token theft and cluster access.
https://bugzilla.redhat.com/show_bug.cgi?id=2370812
https://nvd.nist.gov/vuln/detail/CVE-2025-49520
##A flaw was found in the EDA component of the Ansible Automation Platform, where user-supplied Git branch or refspec values are evaluated as Jinja2 templates. This vulnerability allows authenticated users to inject expressions that execute commands or access sensitive files on the EDA worker. In OpenShift, it can lead to service account token theft.
updated 2025-07-01T01:00:02.237000
16 posts
2 repos
CVE ID: CVE-2025-6543
Vendor: Citrix
Product: NetScaler ADC and Gateway
Date Added: 2025-06-30
Notes: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 ; https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CVE-2025-6543 (citrix 🩸) hit KEV. that means confirmed exploitation with receipts. will wash dishes for payloads. bob [@] greynoise [.] io (some mastodon clients really bork email addresses) if you have'm.
##CVE-2025-6543 (citrix 🩸) hit KEV. that means confirmed exploitation with receipts. will wash dishes for payloads. bob [@] greynoise [.] io (some mastodon clients really bork email addresses) if you have'm.
##CVE ID: CVE-2025-6543
Vendor: Citrix
Product: NetScaler ADC and Gateway
Date Added: 2025-06-30
Notes: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 ; https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CVE-2025-6543 (citrix 🩸) hit KEV. that means confirmed exploitation with receipts. will wash dishes for payloads. bob [@] greynoise [.] io (some mastodon clients really bork email addresses) if you have'm.
##CVE-2025-5777, CVE-2025-6543: Frequently Asked Questions About CitrixBleed 2 and Citrix NetScaler Exploitation – Source: securityboulevard.com https://ciso2ciso.com/cve-2025-5777-cve-2025-6543-frequently-asked-questions-about-citrixbleed-2-and-citrix-netscaler-exploitation-source-securityboulevard-com/ #rssfeedpostgeneratorecho #SecurityBloggersNetwork #CyberSecurityNews #SecurityBoulevard
##I love how statements like:
"Currently, there is no evidence to suggest exploitation of CVE-2025-5777."
... is NOT comforting at all. It pretty much sounds just like... "we found NO vulnerabilities in our LLM-generated application".
... and how on earth would Netscaler see targeted exploitation? Exactly... Netscaler wouldn't, you might however with appropriate monitoring.
##Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC https://thehackernews.com/2025/06/citrix-releases-emergency-patches-for.html
##This new critical vulnerability, tracked as CVE-2025-6543, received a 9.2 severity score. It's a memory overflow vulnerability that can lead to unintended control flow and denial of service. https://www.theregister.com/2025/06/25/citrix_netscaler_critical_bug_exploited/
##🟥𝐋𝐂𝐒𝐂-𝐈𝐄 𝐃𝐚𝐢𝐥𝐲 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐎𝐒𝐈𝐍𝐓 𝐒𝐡𝐚𝐫𝐞-𝟐𝟔 𝐉𝐮𝐧𝐞 𝟐𝟎𝟐𝟓🟥
𝐍𝐞𝐰𝐬:
1. Majority of Irish companies are not minimising risk of cyber attacks, according to new survey
2. First-ever cyber insurance premium decline recorded last year
https://www.cybersecuritydive.com/news/cyber-insurance-premiums-decline-am-best-report/751474/
3. Hackers breach Norwegian dam, open valve at full capacity
https://risky.biz/risky-bulletin-hackers-breach-norwegian-dam-open-valve-at-full-capacity/
https://energiteknikk.net/2025/06/hackere-apnet-ventil-pa-fullt-ved-dam-anlegg/
4. Qilin ransomware attack on UK NHS supplier contributed to patient fatality
https://www.theregister.com/2025/06/26/qilin_ransomware_nhs_death/
5. UK SMEs face rise in cyber attacks with average cost GBP £7,960
https://securitybrief.co.uk/story/uk-smes-face-rise-in-cyber-attacks-with-average-cost-gbp-7-960
6. Reasons Why 2 Million SMEs Have No Cybersecurity Training
https://cybermagazine.com/news/bt-data-warns-uk-smes-lack-cybersecurity-training
7. Insurance Europe calls for streamlining EU cybersecurity regulations
https://www.reinsurancene.ws/insurance-europe-calls-for-streamlining-eu-cybersecurity-regulations/
8. France issues press statement about arrest of ShinyHunters members
9. Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC
https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788
---
𝐆𝐥𝐨𝐛𝐚𝐥 𝐁𝐫𝐞𝐚𝐜𝐡 𝐍𝐞𝐰𝐬 𝐚𝐧𝐝 𝐃𝐚𝐭𝐚 𝐋𝐞𝐚𝐤𝐬:
1. Glasgow City Council impacted by cyber incident
https://www.glasgow.gov.uk/serviceimpact
2. Alliedbankers Insurance Corporation Allegedly Hit by Massive 80GB Data Breach
---
𝐓𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐑𝐞𝐩𝐨𝐫𝐭𝐬 𝐰𝐢𝐭𝐡 𝐈𝐎𝐂𝐬:
1. Iranian Educated Manticore Targets Leading Tech Academics
https://research.checkpoint.com/2025/iranian-educated-manticore-targets-leading-tech-academics/
2. In the Wild: Malware Prototype with Embedded Prompt Injection
https://research.checkpoint.com/2025/ai-evasion-prompt-injection/
3. Patch and Persist: Darktrace’s Detection of Blind Eagle (APT-C-36)
4. ODYSSEY STEALER : THE REBRAND OF POSEIDON STEALER
https://www.cyfirma.com/research/odyssey-stealer-the-rebrand-of-poseidon-stealer/
5. Prolific Phishing Campaign Leveraging Zoom's Infrastructure
https://blog.reconinfosec.com/zoom-events-phishing
6. Hive0154 aka Mustang Panda shifts focus on Tibetan community to deploy Pubload backdoor
7. Gh0st RAT – Active IOCs
https://rewterz.com/threat-advisory/gh0st-rat-active-iocs-6
---
𝐓𝐡𝐫𝐞𝐚𝐭 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 / 𝐃𝐅𝐈𝐑 / 𝐌𝐚𝐥𝐰𝐚𝐫𝐞:
1. Microsoft Entra ID OAuth Phishing and Detections
https://www.elastic.co/security-labs/entra-id-oauth-phishing-detection
2. Cybersecurity Stop of the Month: Adversary-in-the-Middle Attacks that Target Microsoft 365
3. OSINT Guide Pt 2: Using Telethon + Python to scrape Telegram Data
4. Top 3 Cyber Attacks in June 2025: GitHub Abuse, Control Flow Flattening, and More
https://any.run/cybersecurity-blog/cybersecurity-blog/cyber-attacks-june-2025/
5. The Case of Hidden Spam Pages
https://blog.sucuri.net/2025/06/the-case-of-hidden-spam-pages.html?web_view=true
6. Untrustworthy Trust Builders: Account Operators Replicating Trust Attack (AORTA)
7. New BRAODO Stealer Campaign Abuses GitHub To Host Payloads And Evade Detection
https://cybersecuritynews.com/new-braodo-stealer-campaign-abuses-github/
8. Setup for Maldev on android
https://medium.com/@lord_murak/setup-for-maldev-on-android-b1ee7cc307cb
9. Anomaly Detection in .onion Traffic Using Machine Learning
---
𝐋𝐢𝐠𝐡𝐭 𝐑𝐞𝐚𝐝𝐢𝐧𝐠:
1. How Foreign Scammers Use U.S. Banks to Fleece Americans
https://www.propublica.org/article/pig-butchering-scam-cybercrime-us-banks-money-laundering
2. Threat Brief: Escalation of Cyber Risk Related to Iran
https://unit42.paloaltonetworks.com/iranian-cyberattacks-2025/
3. A brief overview of the main incidents in industrial cybersecurity. Q1 2025
4. China Cyber Espionage Against Russia Is Telling About Adversary Partnerships
5. Charming Kitten APT Tries Spying on Israeli Cybersecurity Experts
https://www.darkreading.com/threat-intelligence/iran-apt-spying-israeli-cybersecurity-experts
6. Cybercriminal abuse of large language models
https://blog.talosintelligence.com/cybercriminal-abuse-of-large-language-models/
---
##Citrix releases emergency patches for actively exploited vulnerability in NetScaler Products
Citrix has patched a critical actively exploited vulnerability (CVE-2025-6543) in NetScaler ADC and Gateway products that security experts suspect enables code execution despite being characterized as denial-of-service. Citrix has also patched two other critical flaws including one compared to the infamous 2023 CitrixBleed vulnerability. Organizations are urged to immediately patch affected systems and terminate all active sessions.
**This is now important and URGENT. Your Citrix NetScaler ADC or Gateway, exposed on the internet, they are actively attacked and exploited. Also, there seems to be some indisclosed severity in the three latest critical flaws and possibility of a repeat of the CitrixBleed incident from 2023. Immediately update to the latest patched versions (14.1-47.46, 13.1-59.19, or 13.1-37.236-FIPS). After patching, you must also terminate all active ICA and PCoIP sessions to prevent attackers from using stolen session tokens. If you have end-of-life devices, shut them down NOW - they will be hacked.**
#cybersecurity #infosec #attack #activeattack
https://beyondmachines.net/event_details/citrix-releases-emergency-patches-for-actively-exploited-vulnerability-in-netscaler-products-m-f-5-f-y/gD2P6Ple2L
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC – Source:thehackernews.com https://ciso2ciso.com/citrix-releases-emergency-patches-for-actively-exploited-cve-2025-6543-in-netscaler-adc-sourcethehackernews-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #Citrix
##Citrix warns of NetScaler vulnerability exploited in DoS attacks
Citrix is warning that a vulnerability in NetScaler appliances tracked as CVE-2025-6543 is being actively exploited in the wild, causing devices to...
🔗️ [Bleepingcomputer] https://link.is.it/c9w2Q9
##Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC https://thehackernews.com/2025/06/citrix-releases-emergency-patches-for.html
##🚨Security Advisory: Citrix NetScaler ADC / Gateway – CVE‑2025‑6543
https://darkwebinformer.com/security-advisory-citrix-netscaler-adc-gateway-cve-2025-6543/
##New:
Citrix: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788
More:
The Hacker News: Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC https://thehackernews.com/2025/06/citrix-releases-emergency-patches-for.html @thehackernews #cybersecurity #Infosec
##updated 2025-07-01T00:33:14.560000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T22:16:54
2 posts
Not yet evaluated means no risk yet, right?
##Orkes Conductor v3.21.11 allows remote attackers to execute arbitrary OS commands through unrestricted access to Java classes.
Not yet evaluated means no risk yet, right?
##Orkes Conductor v3.21.11 allows remote attackers to execute arbitrary OS commands through unrestricted access to Java classes.
updated 2025-06-30T22:15:29.873000
3 posts
🔎 Chrome pre-138.0.7204.96 hit by HIGH severity type confusion (CVE-2025-6554) in V8. Remote attackers can read/write memory via malicious HTML. Patch now! https://radar.offseq.com/threat/cve-2025-6554-type-confusion-in-google-chrome-3352da1d #OffSeq #Chrome #Vulnerability #CVE20256554
##Chrome patched a sev:HIGH CVE with an ITW exploit.
Google is aware that an exploit for CVE-2025-6554 exists in the wild.
https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html
##Chrome patched a sev:HIGH CVE with an ITW exploit.
Google is aware that an exploit for CVE-2025-6554 exists in the wild.
https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html
##updated 2025-06-30T21:31:52
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T21:30:54
7 posts
Sudo versions 1.9.14 to 1.9.17 (inclusive) have two critical vulnerabilities:
- local privilege escalation via chroot option (CVE-2025-32463) https://www.openwall.com/lists/oss-security/2025/06/30/3
- local privilege escalation via host option (CVE-2025-32462) https://www.openwall.com/lists/oss-security/2025/06/30/2
𝐬𝐮𝐝𝐨 -𝐡 𝐡𝐨𝐬𝐭
Turns out the "h" stands for "hold my beer". 🍺 😅
⬇️
Local Privilege Escalation via host option
Sudo’s host (-h or --host) option is intended to be used in conjunction with the list option (-l or --list) to list a user’s sudo privileges on a host other than the current one. However, due to a bug it was not restricted to listing privileges and could be used when running a command via sudo or editing a file with sudoedit. Depending on the rules present in the sudoers file this could allow a local privilege escalation attack.
Sudo versions 1.8.8 to 1.9.17 inclusive are affected.
👇
https://www.sudo.ws/security/advisories/host_any/
[related]
Vulnerability Advisory: Sudo Host Option Elevation of Privilege
👇
https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host
Setting up sudo (1.9.13p3-1+deb12u2) ...
Et hop, CVE-2025-32462 ne passera pas par moi. https://tracker.debian.org/news/1649978/accepted-sudo-1913p3-1deb12u2-source-into-stable-security/
##⚠️ Faille Sudo, il faut corriger rapidement.
CVE-2025-32462 : une faille dans sudo permet l’escalade de privilèges locaux via l’option host (V)
TL;DR : Faille de type "Trust me bro on est sur une autre machine lance la commande". (L)
##Sudo versions 1.9.14 to 1.9.17 (inclusive) have two critical vulnerabilities:
- local privilege escalation via chroot option (CVE-2025-32463) https://www.openwall.com/lists/oss-security/2025/06/30/3
- local privilege escalation via host option (CVE-2025-32462) https://www.openwall.com/lists/oss-security/2025/06/30/2
𝐬𝐮𝐝𝐨 -𝐡 𝐡𝐨𝐬𝐭
Turns out the "h" stands for "hold my beer". 🍺 😅
⬇️
Local Privilege Escalation via host option
Sudo’s host (-h or --host) option is intended to be used in conjunction with the list option (-l or --list) to list a user’s sudo privileges on a host other than the current one. However, due to a bug it was not restricted to listing privileges and could be used when running a command via sudo or editing a file with sudoedit. Depending on the rules present in the sudoers file this could allow a local privilege escalation attack.
Sudo versions 1.8.8 to 1.9.17 inclusive are affected.
👇
https://www.sudo.ws/security/advisories/host_any/
[related]
Vulnerability Advisory: Sudo Host Option Elevation of Privilege
👇
https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host
Setting up sudo (1.9.13p3-1+deb12u2) ...
Et hop, CVE-2025-32462 ne passera pas par moi. https://tracker.debian.org/news/1649978/accepted-sudo-1913p3-1deb12u2-source-into-stable-security/
##updated 2025-06-30T21:30:50
1 posts
🔒 CVE-2025-5730: HIGH severity stored XSS in Contact Form Plugin <1.1.29 for WordPress. Contributor roles can persistently inject scripts—risking admin compromise & data leaks. Restrict access, monitor logs, and prep for a patch. https://radar.offseq.com/threat/cve-2025-5730-cwe-79-cross-site-scripting-xss-in-c-624e7090 #OffSeq #WordPress #XSS #Vuln
##updated 2025-06-30T21:15:32.730000
2 posts
1 repos
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T21:15:30.257000
7 posts
Turns out sudo -f was implemented as sudo -R...
https://leahneukirchen.org/blog/archive/2011/04/sudo-f.html
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
##CVE-2025-32463 Vulnerability Advisory: Sudo chroot Elevation of Privilege https://lobste.rs/s/srcfxn #linux #security
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
Sudo versions 1.9.14 to 1.9.17 (inclusive) have two critical vulnerabilities:
- local privilege escalation via chroot option (CVE-2025-32463) https://www.openwall.com/lists/oss-security/2025/06/30/3
- local privilege escalation via host option (CVE-2025-32462) https://www.openwall.com/lists/oss-security/2025/06/30/2
Oula, une vulnérabilité sur "sudo" https://ubuntu.com/security/CVE-2025-32463
> An attacker can leverage sudo’s `-R` (`--chroot`) option to run arbitrary commands as root, even if they are not listed in the sudoers file. Sudo versions 1.9.14 to 1.9.17 inclusive are affected.
##Turns out sudo -f was implemented as sudo -R...
https://leahneukirchen.org/blog/archive/2011/04/sudo-f.html
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
##CVE-2025-32463 Vulnerability Advisory: Sudo chroot Elevation of Privilege https://lobste.rs/s/srcfxn #linux #security
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
Sudo versions 1.9.14 to 1.9.17 (inclusive) have two critical vulnerabilities:
- local privilege escalation via chroot option (CVE-2025-32463) https://www.openwall.com/lists/oss-security/2025/06/30/3
- local privilege escalation via host option (CVE-2025-32462) https://www.openwall.com/lists/oss-security/2025/06/30/2
updated 2025-06-30T18:38:48.477000
2 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-30T18:38:48.477000
2 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-30T18:38:23.493000
3 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##D-Link DIR-513 v1.0 hit by HIGH severity buffer overflow (CVE-2025-6882) in /goform/formSetWanPPTP. No patch—device EOL. Public exploit available! Replace or isolate immediately. https://radar.offseq.com/threat/cve-2025-6882-buffer-overflow-in-d-link-dir-513-900121ef #OffSeq #InfoSec #Vuln #RouterSecurity
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T18:38:23.493000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T18:38:23.493000
2 posts
I know a bunch of you nerds like playing with ESP32s, etc.
sev:HIGH 8.7 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
##ESPAsyncWebServer is an asynchronous HTTP and WebSocket server library for ESP32, ESP8266, RP2040 and RP2350. In versions up to and including 3.7.8, a CRLF (Carriage Return Line Feed) injection vulnerability exists in the construction and output of HTTP headers within
AsyncWebHeader.cpp. Unsanitized input allows attackers to inject CR (\r) or LF (\n) characters into header names or values, leading to arbitrary header or response manipulation. Manipulation of HTTP headers and responses can enable a wide range of attacks, making the severity of this vulnerability high. A fix is available at pull request 211 and is expected to be part of version 3.7.9.
I know a bunch of you nerds like playing with ESP32s, etc.
sev:HIGH 8.7 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
##ESPAsyncWebServer is an asynchronous HTTP and WebSocket server library for ESP32, ESP8266, RP2040 and RP2350. In versions up to and including 3.7.8, a CRLF (Carriage Return Line Feed) injection vulnerability exists in the construction and output of HTTP headers within
AsyncWebHeader.cpp. Unsanitized input allows attackers to inject CR (\r) or LF (\n) characters into header names or values, leading to arbitrary header or response manipulation. Manipulation of HTTP headers and responses can enable a wide range of attacks, making the severity of this vulnerability high. A fix is available at pull request 211 and is expected to be part of version 3.7.9.
updated 2025-06-30T18:38:23.493000
1 posts
🔍 CVE-2025-53415: HIGH severity in Delta Electronics DTM Soft. Unsafe deserialization of project files enables RCE—no patch yet. Restrict access, block untrusted files, and segment networks! https://radar.offseq.com/threat/cve-2025-53415-cwe-502-deserialization-of-untruste-250f03c5 #OffSeq #ICS #Vuln #Cybersecurity
##updated 2025-06-30T15:31:43
2 posts
That's kind of a fun PrivEsc.
sev:CRIT 9.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##The Debian zuluPolkit/CMakeLists.txt file for zuluCrypt through the zulucrypt_6.2.0-1 package has insecure PolicyKit allow_any/allow_inactive/allow_active settings that allow a local user to escalate their privileges to root.
That's kind of a fun PrivEsc.
sev:CRIT 9.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##The Debian zuluPolkit/CMakeLists.txt file for zuluCrypt through the zulucrypt_6.2.0-1 package has insecure PolicyKit allow_any/allow_inactive/allow_active settings that allow a local user to escalate their privileges to root.
updated 2025-06-30T15:30:38
3 posts
Fucking Ubiquiti showing they're the Tesla of networking yet again.
sev:CRIT 9.9 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
##Multiple Authenticated SQL Injection vulnerabilities found in UISP Application (Version 2.4.206 and earlier) could allow a malicious actor with low privileges to escalate privileges.
🛡️ Critical vuln (CVE-2025-24290) in Ubiquiti UISP ≤2.4.206: Authenticated SQL injection lets low-priv users escalate to admin! Patch when available, restrict UI access, audit privileges. https://radar.offseq.com/threat/cve-2025-24290-vulnerability-in-ubiquiti-inc-uisp--741026aa #OffSeq #Ubiquiti #SQLi #Infosec
##Fucking Ubiquiti showing they're the Tesla of networking yet again.
sev:CRIT 9.9 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
##Multiple Authenticated SQL Injection vulnerabilities found in UISP Application (Version 2.4.206 and earlier) could allow a malicious actor with low privileges to escalate privileges.
updated 2025-06-30T12:30:52
1 posts
#OT #Advisory VDE-2024-061
ifm: Improper Access Control vulnerability
#CVE CVE-2024-8419
https://certvde.com/en/advisories/VDE-2024-061
#CSAF https://ifm.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2024-061.json
##updated 2025-06-30T09:30:30
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T09:30:30
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T09:30:30
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T06:30:33
4 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##🚨 HIGH severity vuln: Tenda AC5 (15.03.06.47) stack buffer overflow in /goform/openSchedWifi (CVE-2025-6886). Remote exploit public. Restrict access & monitor for fixes! https://radar.offseq.com/threat/cve-2025-6886-stack-based-buffer-overflow-in-tenda-25c90c53 #OffSeq #Vuln #IoT #Tenda
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##🚨 HIGH severity vuln: Tenda AC5 (15.03.06.47) stack buffer overflow in /goform/openSchedWifi (CVE-2025-6886). Remote exploit public. Restrict access & monitor for fixes! https://radar.offseq.com/threat/cve-2025-6886-stack-based-buffer-overflow-in-tenda-25c90c53 #OffSeq #Vuln #IoT #Tenda
##updated 2025-06-30T06:30:33
3 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##🚨 HIGH severity: CVE-2025-6887 in Tenda AC5 (15.03.06.47). Stack-based buffer overflow via /goform/SetSysTimeCfg—remote exploit code is public. No patch out yet. Urgent: Restrict access, disable remote mgmt, monitor for suspicious activity. https://radar.offseq.com/threat/cve-2025-6887-stack-based-buffer-overflow-in-tenda-c30dce07 #OffSeq #Vulnerability #Tenda #Infosec
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T03:30:39
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T03:15:25.990000
3 posts
3 repos
https://github.com/guinea-offensive-security/CVE-2025-6019
Two new Linux flaws (CVE-2025-6018, CVE-2025-6019) allow local attackers to escalate to root via PAM misconfig and udisks. Exploits confirmed on Ubuntu, Fedora, Debian. Admins urged to patch immediately.
##@mina Sure. But it doesn't explain why the dash is not allowed. my example is an official CVE. Which is CVE-YEAR-Number, example: CVE-2025-6019. It is NOT CVE_2025_6019. So why is underscore allowed in a hashtag but the dash isn't? @Gargron @evan
##Yo, fellow Linuxers, #CVE20256019 has been published and updates are available. The TL;DR. A Local Privilege Escalation to root via libblockdev. Notice the local. So you need to be able to be on the machine. Still, update now.
##updated 2025-06-28T21:30:35
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T21:31:30
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:31:47
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:31:47
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:31:47
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:31:47
1 posts
Multiple vulnerabilities reported in ControlID iDSecure vehicle access control systems
ControlID has patched three critical vulnerabilities in its iDSecure On-Premises access control software, including a SQL injection flaw (CVE-2025-49853) and authentication bypass (CVE-2025-49851) that could allow attackers to gain unauthorized access to physical facilities and manipulate vehicle access systems.
**If you use ControlID iDSecure On-Premises access control software, check if it's accessible from the internet. If it is, make sure it's isolated from the internet and accessible only from trusted networks as much as possible Then plan a quick update to version 4.7.50.0. This system controls physical access to your facilities, so breaching it may get criminals access to your premises.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-vulnerabilities-reported-in-controlid-idsecure-vehicle-access-control-systems-3-6-m-4-t/gD2P6Ple2L
updated 2025-06-27T18:30:51
2 posts
Internet. Of. Shit.
##Unauthenticated users on an adjacent network with the Sight Bulb Pro can run shell commands as root through a vulnerable proprietary TCP protocol available on Port 16668. This vulnerability allows an attacker to run arbitrary commands on the Sight Bulb Pro by passing a well formed JSON string.
Internet. Of. Shit.
##Unauthenticated users on an adjacent network with the Sight Bulb Pro can run shell commands as root through a vulnerable proprietary TCP protocol available on Port 16668. This vulnerability allows an attacker to run arbitrary commands on the Sight Bulb Pro by passing a well formed JSON string.
updated 2025-06-27T18:10:30.697000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T16:57:49.563000
3 posts
1 repos
CISA warns that AMI MegaRAC Vulnerability that enables server takeover is actively exploited
CISA has reported active exploitation of a maximum-severity vulnerability (CVE-2024-54085, CVSS 10.0) in AMI's MegaRAC Baseboard Management Controller software that allows unauthenticated remote attackers to completely hijack servers, deploy ransomware, and potentially cause irreversible hardware damage through malicious firmware manipulation.
**Check your servers NOW. If any of them use AMI's MegaRAC Baseboard Management Controller, make sure that the BMC is isolated in a separate network segment and only accessible only from internal trusted systems. Reach out to your server vendor for a patch, and plan a patch period. Don't ignore this one, since hackers are already exploiting this flaw.**
#cybersecurity #infosec #advisory #ransomware
https://beyondmachines.net/event_details/cisa-warns-that-ami-megarac-vulnerability-that-enables-server-takeover-is-actively-exploited-b-k-s-7-2/gD2P6Ple2L
New.
CISA has added to the KEV catalogue. The usual suspects are back.
- CVE-2024-54085: AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-54085
- CVE-2024-0769: D-Link DIR-859 Router Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-0769
- CVE-2019-6693: Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability https://www.cve.org/CVERecord?id=CVE-2019-6693 #cybersecurity #CISA #infosec
##CVE ID: CVE-2024-54085
Vendor: AMI
Product: MegaRAC SPx
Date Added: 2025-06-25
Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf ; https://security.netapp.com/advisory/ntap-20250328-0003/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-54085
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-54085
updated 2025-06-27T16:43:42.703000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T15:32:26
5 posts
1 repos
More information on printer security, since they are often a cybersecurity blind spot!
Last week, we shared a warning about the unpatchable Brother printer vulnerability (CVE-2024-51978) that puts millions of devices at risk. If you haven’t updated your default admin passwords, do it now.
Since there was a lot of interest in this topic, we're sharing our classic, but still very relevant, on-demand webinar, "How I met your printer": https://youtu.be/b6d6RO2AFgw
@tompohl shares real-world techniques attackers use to exploit printers for initial access and lateral movement—exactly what we see in our penetration tests all the time.
If you haven’t tested your print infrastructure, now’s the time. Need help? Our pentest team can assess your network and highlight hidden vulnerabilities.
#Cybersecurity #CISO #PrinterSecurity #PenetrationTesting #LMGSecurity #NetworkSecurity #Infosec #ITsecurity
#penetrationtesting #pentest #pentesting
More information on printer security, since they are often a cybersecurity blind spot!
Last week, we shared a warning about the unpatchable Brother printer vulnerability (CVE-2024-51978) that puts millions of devices at risk. If you haven’t updated your default admin passwords, do it now.
Since there was a lot of interest in this topic, we're sharing our classic, but still very relevant, on-demand webinar, "How I met your printer": https://youtu.be/b6d6RO2AFgw
@tompohl shares real-world techniques attackers use to exploit printers for initial access and lateral movement—exactly what we see in our penetration tests all the time.
If you haven’t tested your print infrastructure, now’s the time. Need help? Our pentest team can assess your network and highlight hidden vulnerabilities.
#Cybersecurity #CISO #PrinterSecurity #PenetrationTesting #LMGSecurity #NetworkSecurity #Infosec #ITsecurity
#penetrationtesting #pentest #pentesting
Hundreds of Brother printer models are affected by a critical, unpatchable vulnerability (CVE-2024-51978) that allows attackers to generate the default admin password using the device’s serial number—information that’s easily discoverable via other flaws.
748 total models across Brother, Fujifilm, Ricoh, Toshiba, and Konica Minolta are impacted, with millions of devices at risk globally.
Attackers can:
• Gain unauthenticated admin access
• Pivot to full remote code execution
• Exfiltrate credentials for LDAP, FTP, and more
• Move laterally through your network
Brother says the vulnerability cannot be fixed in firmware and requires a change in manufacturing. For now, mitigation = change the default admin password immediately.
Our pentest team regularly highlights printer security as a critical path to system compromise—and today’s news is another example that underscores this risk. This is your reminder: Printers are not “set-and-forget” devices. Treat them like any other endpoint—monitor, patch, and lock them down.
Need help testing your network for exploitable print devices? Contact us and our pentest team can help!
Read the Dark Reading article for more details on the Brother Printers vulnerability: https://www.darkreading.com/endpoint-security/millions-brother-printers-critical-unpatchable-bug
#CyberSecurity #PenetrationTesting #Pentest #Pentesting #PrinterSecurity #BrotherPrinters #CVE202451978 #Infosec #IT #SMB #CISO #Cyberaware #DFIR #ITSecurity #ZeroTrust #PatchNow #Pentest
##Although seven of the eight flaws can be patched, the aforementioned vulnerability, CVE-2024-51978, cannot. https://www.darkreading.com/endpoint-security/millions-brother-printers-critical-unpatchable-bug
##Vulnerabilities reported in Brother printers and other vendors, at least one critical
Brother Industries and four other major printer manufacturers have disclosed eight security vulnerabilities affecting 748 models of multifunction printers, including a critical authentication bypass flaw (CVE-2024-51978) that allows unauthenticated attackers to generate default administrator passwords using a predictable algorithm and cannot be fully patched through firmware updates.
**If you have Brother printers (or multifunction devices from FUJIFILM, Ricoh, Toshiba Tec, or Konica Minolta), immediately change all default administrator passwords since they probably have a flaw that allows attackers to generate these passwords and can't be fully patched. Alsom, make sure the printer are not accessible from the internet. Then apply the latest firmware updates to fix the other flaws.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/vulnerabilities-reported-in-brother-printers-at-least-one-critical-h-5-x-s-1/gD2P6Ple2L
updated 2025-06-27T15:31:41
2 posts
Researchers report flaw in Open VSX Registry that can compromise VS Code extensions marketplace
Cybersecurity researchers disclosed a critical vulnerability (CVE-2025-6705) in the Open VSX Registry that could have allowed attackers to gain complete control over the Visual Studio Code extensions marketplace by exploiting the automated publishing mechanism to steal high-privilege tokens and distribute malicious updates to millions of developer environments. The Eclipse Foundation patched the vulnerability on June 25, 2025.
**When designing your CI/CD system, review what code will it run and whether it will expose your API keys and other secrets to untrusted third party code that may be malicious. If your CI/CD will run such code, consider levels of isolation or use API keys that are for that session only with limited permissions. Yes, this is very difficult, but it's part of the complexity of running any code from anyone.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/researchers-report-flaw-in-open-vsx-registry-that-can-compromise-vs-code-extensions-marketplace-b-8-f-8-r/gD2P6Ple2L
Researchers report flaw in Open VSX Registry that can compromise VS Code extensions marketplace
Cybersecurity researchers disclosed a critical vulnerability (CVE-2025-6705) in the Open VSX Registry that could have allowed attackers to gain complete control over the Visual Studio Code extensions marketplace by exploiting the automated publishing mechanism to steal high-privilege tokens and distribute malicious updates to millions of developer environments. The Eclipse Foundation patched the vulnerability on June 25, 2025.
**When designing your CI/CD system, review what code will it run and whether it will expose your API keys and other secrets to untrusted third party code that may be malicious. If your CI/CD will run such code, consider levels of isolation or use API keys that are for that session only with limited permissions. Yes, this is very difficult, but it's part of the complexity of running any code from anyone.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/researchers-report-flaw-in-open-vsx-registry-that-can-compromise-vs-code-extensions-marketplace-b-8-f-8-r/gD2P6Ple2L
updated 2025-06-27T12:32:20
2 posts
CVE-2025-3699: la puerta trasera (no intencionada) en los HVAC de Mitsubishi Electric https://www.hackplayers.com/2025/06/cve-2025-3699-Mitsubishi-Electric.html #vulnerabilidades #amenazas #IoT #OT
##Critical vulnerability exposes Mitsubishi Electric Air Conditioning Controllers to remote takeover
CISA has reported a critical vulnerability (CVE-2025-3699) in Mitsubishi Electric air conditioning control systems that allows remote unauthenticated attackers to bypass login mechanisms and gain unauthorized control over industrial HVAC infrastructure through missing authentication protections.
**If you have Mitsubishi Electric air conditioning controllers, make sure they are isolated from the internet and accessible only from trusted networks. Also make sure thar physical access to HVAC control panels is properly secured. Then contact Mitsubishi Electric for patch availability.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerability-exposes-mitsubishi-electric-air-conditioning-controllers-to-remote-takeover-v-3-9-t-4/gD2P6Ple2L
updated 2025-06-27T06:31:22
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T06:31:22
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T03:30:47
2 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-27T03:30:47
2 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-27T03:30:47
2 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-27T03:30:47
2 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-27T00:32:15
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T00:32:15
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:22
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:21
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:21
3 posts
Oof.
https://www.ibm.com/support/pages/node/7237967
sev:CRIT 9.0 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
##IBM WebSphere Application Server 8.5 and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially crafted sequence of serialized objects.
Critical IBM WebSphere Flaw Opens Door to Remote Code Execution: Patch Urgently
Exploiting Enterprise Middleware: A Growing Security Crisis A major cybersecurity warning has just emerged surrounding IBM WebSphere Application Server. A critical vulnerability identified as CVE-2025-36038 is putting enterprise environments at extreme risk. Rated a 9.0 on the CVSS scale, this deserialization flaw allows unauthenticated attackers to execute arbitrary code…
##Oof.
https://www.ibm.com/support/pages/node/7237967
sev:CRIT 9.0 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
##IBM WebSphere Application Server 8.5 and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially crafted sequence of serialized objects.
updated 2025-06-26T21:31:20
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:20
7 posts
1 repos
https://github.com/abrewer251/CVE-2025-20281-2-Citrix-ISE-RCE
🚨CVE-2025-20281 & CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC
• CVSS: 10
• ZoomEye Dork: app="Cisco ISE"
• Results: 1,937
• Advisory:
github.com/advisories/GHSA-rc4f-42xm-hvjwgithub.com/advisories/GHSA-w8p2-wjjr-hr24
• PoC: github.com/abrewer251/CVE-2025-20281-2-Citrix-ISE-RCE
• ZoomEye Search: zoomeye.ai/searchResult?q=YXBwPSJDaXNjbyBJU0Ui
—————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership. 💙
##🚨CVE-2025-20281 & CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC
• CVSS: 10
• ZoomEye Dork: app="Cisco ISE"
• Results: 1,937
• Advisory:
github.com/advisories/GHSA-rc4f-42xm-hvjwgithub.com/advisories/GHSA-w8p2-wjjr-hr24
• PoC: github.com/abrewer251/CVE-2025-20281-2-Citrix-ISE-RCE
• ZoomEye Search: zoomeye.ai/searchResult?q=YXBwPSJDaXNjbyBJU0Ui
—————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership. 💙
##CVE-2025-20281 and CVE-2025-20282 Vulnerabilities: Critical RCE Flaws in Cisco ISE and ISE-PIC Enable Root Access – Source: socprime.com https://ciso2ciso.com/cve-2025-20281-and-cve-2025-20282-vulnerabilities-critical-rce-flaws-in-cisco-ise-and-ise-pic-enable-root-access-source-socprime-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #CVE-2025-20281 #CVE-2025-20282 #Latestthreats #Vulnerability #socprimecom #socprime #Blog #CVE #rce
##🚨Critical Cisco ISE Vulnerabilities, CVE-2025-20281 & CVE-2025-20282
Two unauthenticated RCE flaws have been disclosed in Cisco ISE and ISE-PIC, allowing remote attackers to execute commands as root without credentials.
CVE-2025-20281
• Affects: ISE 3.3 & 3.4
• Flaw: Improper input validation in external API
• CVSS: 9.8
CVE-2025-20282
• Affects: ISE 3.4
• Flaw: Internal API permits privileged file uploads
• CVSS: 10.0 (Critical)
Full advisory:
https://www.cisco.com/c/en/us/support/docs/field-notices/704/fn70475.html
CVE-2025-20281:
https://www.cvedetails.com/cve/CVE-2025-20281/
CVE-2025-20282:
https://www.cvedetails.com/cve/CVE-2025-20282/
Cisco posted these yesterday.
- Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities - CVE-2025-20281 and
CVE-2025-20282 (critical) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- Cisco Identity Services Engine Authorization Bypass Vulnerability - CVE-2025-20264 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-mVfKVQAU @TalosSecurity #cybersecurity #infosec #Cisco
##Exploitable without authentication, the two flaws are tracked as CVE-2025-20281 and CVE-2025-20282 and have the maximum severity score of 10/10. Both impact specific APIs within the affected products. https://www.securityweek.com/critical-cisco-ise-vulnerabilities-allow-remote-code-execution/
##Cisco reports perfect 10 critical remote code execution flaws in Identity Services Engine (ISE)
Cisco has issued an emergency advisory for two maximum-severity vulnerabilities (CVE-2025-20281 and CVE-2025-20282) in its Identity Services Engine (ISE) platforms that allow unauthenticated remote attackers to execute arbitrary code with root privileges through API input validation flaws and malicious file uploads. Organizations are urged to immediately apply the available patches as no workarounds exist to mitigate the flaws.
**This one is very important. If you are using Cisco Identity Services Engine (ISE), drop everything and start planning a patch ASAP. ISE usually controls network access to a lot of the infrastructure, so you don't want it to be hacked. And hackers will quickly start abusing these flaws.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/cisco-reports-perfect-10-critical-remote-code-execution-flaws-in-identity-services-engine-ise-m-m-f-c-7/gD2P6Ple2L
updated 2025-06-26T21:31:20
1 posts
Multiple critical flaws reported in MICROSENS NMP Web+ Network Management Platform
MICROSENS has patched three critical vulnerabilities in its NMP Web+ network management platform, including authentication bypass through hard-coded JWT constants (CVE-2025-49151) and path traversal enabling arbitrary code execution (CVE-2025-49153). The company urges immediate updates to version 3.3.0 for all installations running version 3.2.5 or earlier.
**If you use MICROSENS NMP Web+ network management platform, make sure it's isolated from the internet and accessible only fron trusted networks. Then plan a quick update to version 3.3.0 to patch, because these flaws are fairly trivial to abuse.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-critical-flaws-reported-in-microsens-nmp-web-network-management-platform-2-m-v-t-v/gD2P6Ple2L
updated 2025-06-26T21:31:13
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:13
7 posts
🚨CVE-2025-20281 & CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC
• CVSS: 10
• ZoomEye Dork: app="Cisco ISE"
• Results: 1,937
• Advisory:
github.com/advisories/GHSA-rc4f-42xm-hvjwgithub.com/advisories/GHSA-w8p2-wjjr-hr24
• PoC: github.com/abrewer251/CVE-2025-20281-2-Citrix-ISE-RCE
• ZoomEye Search: zoomeye.ai/searchResult?q=YXBwPSJDaXNjbyBJU0Ui
—————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership. 💙
##🚨CVE-2025-20281 & CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC
• CVSS: 10
• ZoomEye Dork: app="Cisco ISE"
• Results: 1,937
• Advisory:
github.com/advisories/GHSA-rc4f-42xm-hvjwgithub.com/advisories/GHSA-w8p2-wjjr-hr24
• PoC: github.com/abrewer251/CVE-2025-20281-2-Citrix-ISE-RCE
• ZoomEye Search: zoomeye.ai/searchResult?q=YXBwPSJDaXNjbyBJU0Ui
—————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership. 💙
##CVE-2025-20281 and CVE-2025-20282 Vulnerabilities: Critical RCE Flaws in Cisco ISE and ISE-PIC Enable Root Access – Source: socprime.com https://ciso2ciso.com/cve-2025-20281-and-cve-2025-20282-vulnerabilities-critical-rce-flaws-in-cisco-ise-and-ise-pic-enable-root-access-source-socprime-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #CVE-2025-20281 #CVE-2025-20282 #Latestthreats #Vulnerability #socprimecom #socprime #Blog #CVE #rce
##🚨Critical Cisco ISE Vulnerabilities, CVE-2025-20281 & CVE-2025-20282
Two unauthenticated RCE flaws have been disclosed in Cisco ISE and ISE-PIC, allowing remote attackers to execute commands as root without credentials.
CVE-2025-20281
• Affects: ISE 3.3 & 3.4
• Flaw: Improper input validation in external API
• CVSS: 9.8
CVE-2025-20282
• Affects: ISE 3.4
• Flaw: Internal API permits privileged file uploads
• CVSS: 10.0 (Critical)
Full advisory:
https://www.cisco.com/c/en/us/support/docs/field-notices/704/fn70475.html
CVE-2025-20281:
https://www.cvedetails.com/cve/CVE-2025-20281/
CVE-2025-20282:
https://www.cvedetails.com/cve/CVE-2025-20282/
Cisco posted these yesterday.
- Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities - CVE-2025-20281 and
CVE-2025-20282 (critical) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- Cisco Identity Services Engine Authorization Bypass Vulnerability - CVE-2025-20264 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-mVfKVQAU @TalosSecurity #cybersecurity #infosec #Cisco
##Exploitable without authentication, the two flaws are tracked as CVE-2025-20281 and CVE-2025-20282 and have the maximum severity score of 10/10. Both impact specific APIs within the affected products. https://www.securityweek.com/critical-cisco-ise-vulnerabilities-allow-remote-code-execution/
##Cisco reports perfect 10 critical remote code execution flaws in Identity Services Engine (ISE)
Cisco has issued an emergency advisory for two maximum-severity vulnerabilities (CVE-2025-20281 and CVE-2025-20282) in its Identity Services Engine (ISE) platforms that allow unauthenticated remote attackers to execute arbitrary code with root privileges through API input validation flaws and malicious file uploads. Organizations are urged to immediately apply the available patches as no workarounds exist to mitigate the flaws.
**This one is very important. If you are using Cisco Identity Services Engine (ISE), drop everything and start planning a patch ASAP. ISE usually controls network access to a lot of the infrastructure, so you don't want it to be hacked. And hackers will quickly start abusing these flaws.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/cisco-reports-perfect-10-critical-remote-code-execution-flaws-in-identity-services-engine-ise-m-m-f-c-7/gD2P6Ple2L
updated 2025-06-26T21:31:13
2 posts
Multiple vulns in Quest KACE SMAs.
##Multiple vulns in Quest KACE SMAs.
##updated 2025-06-26T21:31:13
2 posts
Multiple vulns in Quest KACE SMAs.
##Multiple vulns in Quest KACE SMAs.
##updated 2025-06-26T21:31:13
1 posts
Nvidia updates, from yesterday.
- Security Bulletin: NVIDIA AIStore on Kubernetes - June 2025, affecting CVE-2025-23260 https://nvidia.custhelp.com/app/answers/detail/a_id/5660
This affects CVE-2025-23264 and CVE-2025-23265: NVIDIA Megatron LM - June 2025 https://nvidia.custhelp.com/app/answers/detail/a_id/5663 #cybersecurity #Infoec #Nvidia
##updated 2025-06-26T21:31:13
1 posts
Multiple critical flaws reported in MICROSENS NMP Web+ Network Management Platform
MICROSENS has patched three critical vulnerabilities in its NMP Web+ network management platform, including authentication bypass through hard-coded JWT constants (CVE-2025-49151) and path traversal enabling arbitrary code execution (CVE-2025-49153). The company urges immediate updates to version 3.3.0 for all installations running version 3.2.5 or earlier.
**If you use MICROSENS NMP Web+ network management platform, make sure it's isolated from the internet and accessible only fron trusted networks. Then plan a quick update to version 3.3.0 to patch, because these flaws are fairly trivial to abuse.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-critical-flaws-reported-in-microsens-nmp-web-network-management-platform-2-m-v-t-v/gD2P6Ple2L
updated 2025-06-26T21:31:12
1 posts
Cisco posted these yesterday.
- Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities - CVE-2025-20281 and
CVE-2025-20282 (critical) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- Cisco Identity Services Engine Authorization Bypass Vulnerability - CVE-2025-20264 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-mVfKVQAU @TalosSecurity #cybersecurity #infosec #Cisco
##updated 2025-06-26T21:31:10
1 posts
Nvidia updates, from yesterday.
- Security Bulletin: NVIDIA AIStore on Kubernetes - June 2025, affecting CVE-2025-23260 https://nvidia.custhelp.com/app/answers/detail/a_id/5660
This affects CVE-2025-23264 and CVE-2025-23265: NVIDIA Megatron LM - June 2025 https://nvidia.custhelp.com/app/answers/detail/a_id/5663 #cybersecurity #Infoec #Nvidia
##updated 2025-06-26T21:31:09
3 posts
Oh hey, now if the baddies get your box, you can privesc to get it back.
https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1002/
##Incorrect Permission Assignment for Critical Resource in the TeamViewer Client (Full and Host) of TeamViewer Remote and Tensor prior Version 15.67 on Windows allows a local unprivileged user to trigger arbitrary file deletion with SYSTEM privileges via leveraging the MSI rollback mechanism. The vulnerability only applies to the Remote Management features: Backup, Monitoring, and Patch Management.
Oh hey, now if the baddies get your box, you can privesc to get it back.
https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1002/
##Incorrect Permission Assignment for Critical Resource in the TeamViewer Client (Full and Host) of TeamViewer Remote and Tensor prior Version 15.67 on Windows allows a local unprivileged user to trigger arbitrary file deletion with SYSTEM privileges via leveraging the MSI rollback mechanism. The vulnerability only applies to the Remote Management features: Backup, Monitoring, and Patch Management.
New TeamViewer Vulnerability Puts Windows Systems at Risk of Privilege Escalation https://thecyberexpress.com/cve-2025-36537-teamviewer-remote-management/ #TeamViewervulnerability #TheCyberExpressNews #TeamViewersecurity #TheCyberExpress #CVE-2025-36537 #FirewallDaily #CyberNews #CWE-732
##updated 2025-06-26T21:31:08
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:08
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:08
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:08
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:08
2 posts
Multiple vulns in Quest KACE SMAs.
##Multiple vulns in Quest KACE SMAs.
##updated 2025-06-26T21:31:08
2 posts
sigh
sev:CRIT 9.3 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
A hardcoded credential vulnerability exists in the Blue Angel Software Suite deployed on embedded Linux systems. The application contains multiple known default and hardcoded user accounts that are not disclosed in public documentation. These accounts allow unauthenticated or low-privilege attackers to gain administrative access to the device’s web interface.
And those creds are:
##
blueangel:blueangelroot:abnareum10root:Admin@tbroadroot:superuseruser:userguest:guest
sigh
sev:CRIT 9.3 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
A hardcoded credential vulnerability exists in the Blue Angel Software Suite deployed on embedded Linux systems. The application contains multiple known default and hardcoded user accounts that are not disclosed in public documentation. These accounts allow unauthenticated or low-privilege attackers to gain administrative access to the device’s web interface.
And those creds are:
##
blueangel:blueangelroot:abnareum10root:Admin@tbroadroot:superuseruser:userguest:guest
updated 2025-06-26T21:31:08
2 posts
LMAO. It's an older vuln and was added to CNVD in 2020 but just got a CVE last week. 🥳
sev:CRIT 10.0 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
An OS command injection vulnerability exists in the Chinese versions of Sangfor Endpoint Detection and Response (EDR) management platform versions 3.2.16, 3.2.17, and 3.2.19. The vulnerability allows unauthenticated attackers to construct and send malicious HTTP requests to the EDR Manager interface, leading to arbitrary command execution with elevated privileges. This flaw only affects the Chinese-language EDR builds.
https://www.cnvd.org.cn/flaw/show/CNVD-2020-46552
https://nvd.nist.gov/vuln/detail/CVE-2025-34041
And FWIW, ShadowServer shows EITW in CN.
##LMAO. It's an older vuln and was added to CNVD in 2020 but just got a CVE last week. 🥳
sev:CRIT 10.0 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
An OS command injection vulnerability exists in the Chinese versions of Sangfor Endpoint Detection and Response (EDR) management platform versions 3.2.16, 3.2.17, and 3.2.19. The vulnerability allows unauthenticated attackers to construct and send malicious HTTP requests to the EDR Manager interface, leading to arbitrary command execution with elevated privileges. This flaw only affects the Chinese-language EDR builds.
https://www.cnvd.org.cn/flaw/show/CNVD-2020-46552
https://nvd.nist.gov/vuln/detail/CVE-2025-34041
And FWIW, ShadowServer shows EITW in CN.
##updated 2025-06-26T19:29:56.650000
2 posts
New.
CISA has added to the KEV catalogue. The usual suspects are back.
- CVE-2024-54085: AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-54085
- CVE-2024-0769: D-Link DIR-859 Router Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-0769
- CVE-2019-6693: Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability https://www.cve.org/CVERecord?id=CVE-2019-6693 #cybersecurity #CISA #infosec
##CVE ID: CVE-2024-0769
Vendor: D-Link
Product: DIR-859 Router
Date Added: 2025-06-25
Notes: https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10371 ; https://nvd.nist.gov/vuln/detail/CVE-2024-0769
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-0769
updated 2025-06-26T18:58:14.280000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:58:14.280000
3 posts
Woohoo! Another perfect 10 from last week. And this could hit hard. 🥳
https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.
Woohoo! Another perfect 10 from last week. And this could hit hard. 🥳
https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.
Critical Gogs flaw enables complete code repository takeover
Security researchers have disclosed a critical vulnerability (CVE-2024-56731) in the Gogs self-hosted Git service that allows authenticated attackers to execute arbitrary commands and gain administrative control through a symbolic link bypass enabling unprivileged users to delete critical system files and potentially conduct supply chain attacks.
**If you use Gogs self-hosted Git service, plan a quick upgrade to version 0.13.3. Your Gogs is vulnerable to a flaw that allows complete system takeover. If posible, isolate Gogs from the internet and if you can't upgrade right away, disable user registration in your Gogs configuration to prevent attackers from registering and exploiting this flaw. Then plan a patch cycle.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-gogs-flaw-enables-complete-code-repository-takeover-4-l-z-k-w/gD2P6Ple2L
updated 2025-06-26T18:58:14.280000
2 posts
Wait, we're still doing port knocking? I thought that was a lost art that got snuffed out by the "obscurity does not provide security" nerds.
https://github.com/mbuesch/letmein/security/advisories/GHSA-jpv7-p47h-f43j
##Letmein is an authenticating port knocker. Prior to version 10.2.1, The connection limiter is implemented incorrectly. It allows an arbitrary amount of simultaneously incoming connections (TCP, UDP and Unix socket) for the services letmeind and letmeinfwd. Therefore, the command line option num-connections is not effective and does not limit the number of simultaneously incoming connections. This issue has been patched in version 10.2.1.
Wait, we're still doing port knocking? I thought that was a lost art that got snuffed out by the "obscurity does not provide security" nerds.
https://github.com/mbuesch/letmein/security/advisories/GHSA-jpv7-p47h-f43j
##Letmein is an authenticating port knocker. Prior to version 10.2.1, The connection limiter is implemented incorrectly. It allows an arbitrary amount of simultaneously incoming connections (TCP, UDP and Unix socket) for the services letmeind and letmeinfwd. Therefore, the command line option num-connections is not effective and does not limit the number of simultaneously incoming connections. This issue has been patched in version 10.2.1.
updated 2025-06-26T18:58:14.280000
2 posts
Oh my. Perfect 10 ../ in a KVM server management panel.
https://github.com/ConvoyPanel/panel/security/advisories/GHSA-43g3-qpwq-hfgg
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Convoy is a KVM server management panel for hosting businesses. In versions 3.9.0-rc3 to before 4.4.1, there is a directory traversal vulnerability in the LocaleController component of Performave Convoy. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious locale and namespace parameters. This allows the attacker to include and execute arbitrary PHP files on the server. This issue has been patched in version 4.4.1. A temporary workaround involves implementing strict Web Application Firewall (WAF) rules to incoming requests targeting the vulnerable endpoints.
Oh my. Perfect 10 ../ in a KVM server management panel.
https://github.com/ConvoyPanel/panel/security/advisories/GHSA-43g3-qpwq-hfgg
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Convoy is a KVM server management panel for hosting businesses. In versions 3.9.0-rc3 to before 4.4.1, there is a directory traversal vulnerability in the LocaleController component of Performave Convoy. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious locale and namespace parameters. This allows the attacker to include and execute arbitrary PHP files on the server. This issue has been patched in version 4.4.1. A temporary workaround involves implementing strict Web Application Firewall (WAF) rules to incoming requests targeting the vulnerable endpoints.
updated 2025-06-26T18:58:14.280000
2 posts
Multiple vulns in Quest KACE SMAs.
##Multiple vulns in Quest KACE SMAs.
##updated 2025-06-26T18:58:14.280000
1 posts
Nvidia updates, from yesterday.
- Security Bulletin: NVIDIA AIStore on Kubernetes - June 2025, affecting CVE-2025-23260 https://nvidia.custhelp.com/app/answers/detail/a_id/5660
This affects CVE-2025-23264 and CVE-2025-23265: NVIDIA Megatron LM - June 2025 https://nvidia.custhelp.com/app/answers/detail/a_id/5663 #cybersecurity #Infoec #Nvidia
##updated 2025-06-26T18:58:14.280000
1 posts
Multiple vulnerabilities reported in ControlID iDSecure vehicle access control systems
ControlID has patched three critical vulnerabilities in its iDSecure On-Premises access control software, including a SQL injection flaw (CVE-2025-49853) and authentication bypass (CVE-2025-49851) that could allow attackers to gain unauthorized access to physical facilities and manipulate vehicle access systems.
**If you use ControlID iDSecure On-Premises access control software, check if it's accessible from the internet. If it is, make sure it's isolated from the internet and accessible only from trusted networks as much as possible Then plan a quick update to version 4.7.50.0. This system controls physical access to your facilities, so breaching it may get criminals access to your premises.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-vulnerabilities-reported-in-controlid-idsecure-vehicle-access-control-systems-3-6-m-4-t/gD2P6Ple2L
updated 2025-06-26T18:58:14.280000
1 posts
Security vulnerabilities reported in Kaleris Navis N4 terminal Operating System
Kaleris has patched critical vulnerabilities in its Navis N4 Terminal Operating System used for port operations, including a critical deserialization flaw (CVE-2025-2566) allowing unauthenticated remote code execution and a credential exposure issue (CVE-2025-5087) transmitting sensitive data in cleartext. The company has released patches across multiple version branches and recommends isolating systems from the internet or implementing VPN access for organizations unable to immediately update.
**If you use Navis N4 Terminal Operating System, first check if it's isolated from the internet or requires internet connectivity. Then, prioritize updating to the latest patched version for your branch. If you can't update right away, isolate your N4 systems from the internet or disable the Ultra Light Client component on any internet-facing systems.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/security-vulnerabilities-reported-in-kaleris-navis-n4-terminal-operating-system-y-r-m-i-p/gD2P6Ple2L
updated 2025-06-26T18:57:43.670000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:57:43.670000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:57:43.670000
1 posts
Critical flaw reported in Hunt Electronics DVR Systems exposes plaintext admin credentials
A critical vulnerability (CVE-2025-6561) in Hunt Electronics' hybrid DVR systems allows unauthenticated attackers to retrieve administrator credentials stored in plaintext through simple HTTP requests.
**If you use Hunt Electronics HBF-09KD or HBF-16NK DVR systems, make sure they are isolated from the internet. Then immediately update to firmware V3.1.70_1806 BB50604 since this flaw exposes administrator passwords in plaintext. After patching, change all administrator passwords since they may have already been compromised.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-flaw-reported-in-hunt-electronics-dvr-systems-exposes-plaintext-admin-credentials-5-1-y-d-k/gD2P6Ple2L
updated 2025-06-26T18:31:35
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:31:35
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:31:35
7 posts
updated 2025-06-26T18:31:34
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:31:34
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:31:26
1 posts
Insecure defaults can lead to surprises. When creating FIFO sockets with systemd, be sure to note that SocketMode defaults to 0666 - that is world readable and writable. That is: any local user can communicate with the FIFO. If your FIFO is used to perform privileged operations you must ensure that either the FIFO file itself is located in secured location or set SocketMode to stricter value.
I spotted one such insecure use in cloud-init: the hotplug FIFO was world writable. This is CVE-2024-11584 and fixed in cloud-init 25.1.3.
The commit fixing this is in https://github.com/canonical/cloud-init/pull/6265
##updated 2025-06-26T18:31:25
2 posts
Wat
sev:HIGH 8.8 - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration.
Wat
sev:HIGH 8.8 - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration.
updated 2025-06-26T18:31:21
1 posts
🚨 Buffer overflow (HIGH, CVSS 8.7) in TOTOLINK EX1200T v4.1.2cu.5232_B20210713 exposes networks to remote attack via /boafrm/formTmultiAP (submit-url). Public exploit disclosed. Patch or restrict web interface! CVE-2025-6336 https://radar.offseq.com/threat/cve-2025-6336-buffer-overflow-in-totolink-ex1200t-6f240db7 #OffSeq #Infosec #RouterVuln #IoTSecurity
##updated 2025-06-25T20:14:57.620000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-25T20:10:23.920000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-25T20:09:39.790000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-24T21:30:35
1 posts
Security vulnerabilities reported in Kaleris Navis N4 terminal Operating System
Kaleris has patched critical vulnerabilities in its Navis N4 Terminal Operating System used for port operations, including a critical deserialization flaw (CVE-2025-2566) allowing unauthenticated remote code execution and a credential exposure issue (CVE-2025-5087) transmitting sensitive data in cleartext. The company has released patches across multiple version branches and recommends isolating systems from the internet or implementing VPN access for organizations unable to immediately update.
**If you use Navis N4 Terminal Operating System, first check if it's isolated from the internet or requires internet connectivity. Then, prioritize updating to the latest patched version for your branch. If you can't update right away, isolate your N4 systems from the internet or disable the Ultra Light Client component on any internet-facing systems.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/security-vulnerabilities-reported-in-kaleris-navis-n4-terminal-operating-system-y-r-m-i-p/gD2P6Ple2L
updated 2025-06-24T21:30:28
2 posts
Get your Flippers out.
##An issue in Realtek RTL8762EKF-EVB RTL8762E SDK v1.4.0 allows attackers to cause a Denial of Service (DoS) via sending a crafted before a pairing public key is received during a Bluetooth connection attempt.
Get your Flippers out.
##An issue in Realtek RTL8762EKF-EVB RTL8762E SDK v1.4.0 allows attackers to cause a Denial of Service (DoS) via sending a crafted before a pairing public key is received during a Bluetooth connection attempt.
updated 2025-06-23T22:41:52
1 posts
PBKDF2 JS Lib: Improper Input Validation Vulnerability
##updated 2025-06-23T22:41:42
2 posts
updated 2025-06-23T21:31:56
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T21:31:56
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T21:31:55
8 posts
2 repos
A critical vulnerability (CVE-2025-6218) in WinRAR allows remote code execution via directory traversal on Windows, risking sensitive data. ⚠️
RARLAB has released WinRAR 7.12 Final to fix this issue. Windows users should update immediately for protection. 🔒
#CyberSecurity #Privacy #Security #OpenSource #UserSafety #software #SoftwareUpdate #WinRAR #RAR #ZIP #DataProtection #Microsoft #Windows
##Patchez WinRAR : une faille permet l’exécution de malware via des archives piégées https://www.it-connect.fr/winrar-patch-cve-2025-6218/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##WinRAR patches bug letting malware launch from extracted archives
WinRAR has addressed a directory traversal vulnerability tracked as CVE-2025-6218 that, under certain circumstances, allows malware to be executed...
🔗️ [Bleepingcomputer] https://link.is.it/ZJNdY3
##WinRAR exploit enables attackers to run malicious code on your PC — critical vulnerability patched in latest beta update
The CVE-2025-6218 bug allows attackers to manipulate archive paths, potentially writing to protected system folders
#hardware
https://www.tomshardware.com/software/winrar-exploit-enables-attackers-to-run-malicious-code-on-your-pc-critical-vulnerability-patched-in-latest-beta-update
A recently patched directory traversal vulnerability (CVE-2025-6218) in WinRAR could be leveraged by remote attackers to execute arbitrary code on affected installations.
##High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218) https://www.helpnetsecurity.com/2025/06/24/high-risk-winrar-rce-flaw-patched-update-quickly-cve-2025-6218/ #vulnerability #TrendMicro #Don'tmiss #Hotstuff #Windows #WinRAR #News
##Directory traversal flaw in WinRAR enables remote code execution
RARLAB has patched a path traversal vulnerability (CVE-2025-6218) in WinRAR that allows attackers to execute malicious code by manipulating file extraction paths through specially crafted archive files that redirect extraction to unintended directories.
**If you use WinRAR on Windows, be very cautious of unexpected RAR attachments and never download files from pirated or untrusted sources. Check for the next stable release of WinRAR and update when it's released.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/directory-traversal-flaw-in-winrar-enables-remote-code-execution-p-p-6-n-4/gD2P6Ple2L
updated 2025-06-23T20:16:40.143000
1 posts
CVE-2025-48706 - Out-of-bounds read in COROS PACE 3
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-028.txt
Watch Out! Bluetooth Analysis of the COROS PACE 3
https://blog.syss.com/posts/bluetooth-analysis-coros-pace-3/
##updated 2025-06-23T20:16:21.633000
5 posts
5 repos
https://github.com/b0ySie7e/Notepad-8.8.1_CVE-2025-49144
https://github.com/Vr00mm/CVE-2025-49144
https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC
CVE Record: CVE-2025-49144 - Notepad++ Privilege Escalation In Installer Via Uncontrolled Executable Search Path #SuggestedRead #devopsish https://www.cve.org/CVERecord?id=CVE-2025-49144
##CVE Record: CVE-2025-49144 - Notepad++ Privilege Escalation In Installer Via Uncontrolled Executable Search Path #SuggestedRead #devopsish https://www.cve.org/CVERecord?id=CVE-2025-49144
##Sales pitch toward the end.
Bitdefender: Notepad++ Vulnerability (CVE-2025-49144) Lets Attackers Take Full System Control; PoC Released https://www.bitdefender.com/en-us/blog/hotforsecurity/notepad-vulnerability-lets-attackers-take-full-system-control-poc-released #cybersecurity #infosec
##Flaw in Notepad++ installer could grant attackers SYSTEM access (CVE-2025-49144) https://www.helpnetsecurity.com/2025/06/25/flaw-in-notepad-installer-could-grant-attackers-system-access-cve-2025-49144/ #vulnerability #opensource #Don'tmiss #Hotstuff #News #PoC
##Une faille dans Notepad++ menace Windows : un exploit PoC est disponible ! https://www.it-connect.fr/notepad-plus-plus-cve-2025-49144-faille-windows/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##updated 2025-06-23T20:16:21.633000
2 posts
5 repos
https://github.com/qiaojojo/CVE-2025-49132_poc
https://github.com/63square/CVE-2025-49132
https://github.com/Zen-kun04/CVE-2025-49132
FYI: There is a ton of scanning for this one for some reason.
/locales/locale.json?locale=../../../pterodactyl&namespace=config/database
/locales/locale.json?locale=../../config/&namespace=database
FYI: There is a ton of scanning for this one for some reason.
/locales/locale.json?locale=../../../pterodactyl&namespace=config/database
/locales/locale.json?locale=../../config/&namespace=database
updated 2025-06-23T20:16:21.633000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T18:31:23
2 posts
🚨CVE-2025-50054: Buffer overflow in OpenVPN ovpn-dco-win version 1.3.0 and earlier and version 2.5.8 and earlier allows a local user process to send a too large control message buffer to the kernel driver resulting in a system crash
ZoomEye Link: https://www.zoomeye.ai/searchResult?q=YXBwPSJPcGVuVlBOIg%3D%3D
Results: 2,020,603
ZoomEye Dork: app="OpenVPN"
Advisory: https://github.com/advisories/GHSA-c5v3-f4mm-7xmw
CVSS: 5.5
—————————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership.
I am trying to do more for the DWI community, so this is just the start! 💙
##Critical vulnerability in OpenVPN Windows driver enables system crashes
OpenVPN has patched a critical buffer overflow vulnerability (CVE-2025-50054) in its Windows Data Channel Offload driver that allows unprivileged local attackers to crash systems by sending oversized control messages to the kernel driver. The flaw affects the default virtual network adapter used since OpenVPN version 2.6, with patches available in OpenVPN GUI versions 2.6.14-I002 and 2.7_alpha2-I001 or newer.
**This falls under "not great, not terrible". A malicious user or program on your computer can craft packets that abuse the OpenVPN driver and crash your system, repeatedly. So it's good to track OpenVPN for the next stable release and update your OpenVPN on Windows. But it's not a panic mode patch, because if attackers or malicious programs are on your computer, they are going to do a lot more harm than crash it by abusing OpenVPN.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerability-in-openvpn-windows-driver-enables-system-crashes-1-c-d-d-5/gD2P6Ple2L
updated 2025-06-23T18:30:33
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T18:30:33
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-22T18:30:39
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-22T18:30:31
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-21T00:30:38
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-21T00:30:38
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-21T00:30:37
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-21T00:30:37
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-21T00:30:37
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-20T21:32:14
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-20T21:32:14
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-20T21:32:14
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-20T21:32:13
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-20T21:32:13
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-20T16:38:04
1 posts
Mattermostの任意コード実行の脆弱性、CVSS v3のスコアが9.9
NVD - CVE-2025-4981 : 👀
---
https://nvd.nist.gov/vuln/detail/CVE-2025-4981
updated 2025-06-19T18:31:56
1 posts
IBM reports multiple flawa in QRadar SIEM, at least one critical
IBM has disclosed multiple vulnerabilities in its QRadar SIEM platform, including a critical flaw (CVE-2025-33117) that allows privileged users to execute arbitrary commands through malicious file uploads and configuration modifications. The company has released patches in QRadar SIEM version 7.5.0 UP12 IF02 and urges immediate updates.
**If you're running IBM QRadar SIEM, plan an update to version 7.5.0 UP12 IF02. There is at least one critical patch to fix, but it's not a panic mode since it does require authentication and privileges within the system to be exploited. Just don't ignore the patch, someone will eventually abuse the flaws.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/ibm-reports-multiple-flawa-in-qradar-siem-at-least-one-critical-0-g-z-f-b/gD2P6Ple2L
updated 2025-06-18T18:30:39
1 posts
ClamAV 1.4.3 and 1.0.9 security patch versions published
Today, we are publishing the 1.4.3 and 1.0.9 security patch versions.
[....]
* CVE-2025-20260: Fixed a possible buffer overflow write bug in the PDF
file parser that could cause a denial-of-service (DoS) condition or
enable remote code execution.
This issue only affects configurations where both:
The max file-size scan limit is set greater than or equal to 1024MB.
The max scan-size scan limit is set greater than or equal to 1025MB.
The code flaw was present prior to version 1.0.0, but a change in
version 1.0.0 that enables larger allocations based on untrusted data
made it possible to trigger this bug.
This issue affects all currently supported versions. It will be fixed in:
1.4.3
1.0.9
Thank you to Greg Walkup at Sandia National Labs for identifying this issue.
→ https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html
##updated 2025-06-18T13:46:52.973000
3 posts
Critical remote authentication bypass flaw reported in Teleport access management platform
Teleport has disclosed a critical authentication bypass vulnerability (CVE-2025-49825) that allows remote attackers to completely bypass authentication controls and gain unauthorized access to servers, databases, and cloud applications managed through the platform. The company has released patches across all supported major releases and urges immediate manual upgrades for self-hosted deployments. Teleport is withholding technical details under embargo until June 30, 2025 to achieve higher update coverage.
**If you use self-hosted Teleport for infrastructure access, this is urgent and important. Immediately update to the latest patched version for your branch (17.5.2, 16.5.12, 15.5.3, 14.4.1, 13.4.27, or 12.4.35). Make sure to update both your Teleport proxy servers AND all agents - the vulnerability isn't fully patched until both components are upgraded.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-authentication-bypass-flaw-reported-in-teleport-access-management-platform-u-t-q-o-y/gD2P6Ple2L
updated 2025-06-17T15:31:16
13 posts
2 repos
https://github.com/nagenar/CVE-2025-5777-Session-Hijack
https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
CVE ID: CVE-2025-6543
Vendor: Citrix
Product: NetScaler ADC and Gateway
Date Added: 2025-06-30
Notes: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 ; https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CVE ID: CVE-2025-6543
Vendor: Citrix
Product: NetScaler ADC and Gateway
Date Added: 2025-06-30
Notes: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 ; https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CitrixBleed 2 might be actively exploited (CVE-2025-5777) https://www.helpnetsecurity.com/2025/06/30/citrixbleed-2-might-be-actively-exploited-cve-2025-5777/ #vulnerability #enterprise #ReliaQuest #Don'tmiss #NetScaler #Hotstuff #Censys #Citrix #News
##CVE-2025-5777, CVE-2025-6543: Frequently Asked Questions About CitrixBleed 2 and Citrix NetScaler Exploitation – Source: securityboulevard.com https://ciso2ciso.com/cve-2025-5777-cve-2025-6543-frequently-asked-questions-about-citrixbleed-2-and-citrix-netscaler-exploitation-source-securityboulevard-com/ #rssfeedpostgeneratorecho #SecurityBloggersNetwork #CyberSecurityNews #SecurityBoulevard
##I love how statements like:
"Currently, there is no evidence to suggest exploitation of CVE-2025-5777."
... is NOT comforting at all. It pretty much sounds just like... "we found NO vulnerabilities in our LLM-generated application".
... and how on earth would Netscaler see targeted exploitation? Exactly... Netscaler wouldn't, you might however with appropriate monitoring.
##Critical Citrix Netscaler "Citrix Bleed 2" flaw actively exploited
A critical vulnerability in Citrix NetScaler devices, dubbed "Citrix Bleed 2" (CVE-2025-5777), is now being actively exploited by threat actors according to ReliaQuest, raising concerns of a repeat of the devastating 2023 "Citrix Bleed" campaign that affected major companies like Boeing and Comcast's 36 million customers.
**This is now important and URGENT. Your Citrix NetScaler ADC or Gateway, exposed on the internet, they are actively attacked and exploited. After patching, you must terminate all active ICA and PCoIP sessions since they may already be compromised by attackers.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/critical-citrix-netscaler-citrix-bleed-2-flaw-actively-exploited-4-y-j-i-q/gD2P6Ple2L
Citrix Bleed 2 flaw now believed to be exploited in attacks
[...] A critical NetScaler ADC and Gateway vulnerability dubbed "Citrix Bleed 2" (CVE-2025-5777) is now likely exploited in attacks, according to cybersecurity firm ReliaQuest, seeing an increase in suspicious sessions on Citrix devices.
##Citrix Bleed 2 flaw now believed to be exploited in attacks
A critical NetScaler ADC and Gateway vulnerability dubbed "Citrix Bleed 2" (CVE-2025-5777) is now likely exploited in attacks, according to...
🔗️ [Bleepingcomputer] https://link.is.it/uEldK5
##Citrix on this one:
"At this time, there have been no reports or indications that the vulnerabilities described in CTX693420 (CVE-2025-5349 and CVE-2025-5777) are being actively exploited in the wild. However, due to the critical severity of these issues (CVSS scores of 8.7 and 9.3), We strongly recommends that affected customers apply the updated patches immediately to mitigate any potential risks."
##An update on CVE-2025-5777, explaining why orgs should identify systems and patch.
https://doublepulsar.com/citrixbleed-2-electric-boogaloo-cve-2025-5777-c7f5e349d206
##Critical vulnerabilities discovered in Citrix NetScaler ADC and Gateway products
Citrix has patched two critical vulnerabilities in NetScaler ADC and Gateway products, including an unauthenticated memory overread flaw (CVE-2025-5777) that could expose sensitive data and an access control bypass on the management interface (CVE-2025-5349). The company strongly urges updates for customer-managed instances.
**If you have self-hosted Citrix NetScaler ADC or Gateway, check if your version is still supported and apply the security patches. This is especially important if your Citrix functions as a gateway/VPN server. Take note that versions 12.1 and 13.0 are end-of-life with no fixes available. After patching, restart all active user sessions to clear any potential compromises from these critical vulnerabilities.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerabilities-discovered-in-citrix-netscaler-adc-and-gateway-products-4-l-a-4-n/gD2P6Ple2L
Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777) https://www.helpnetsecurity.com/2025/06/23/critical-citrix-netscaler-bug-fixed-upgrade-asap-cve-2025-5777/ #securityupdate #vulnerability #enterprise #Don'tmiss #NetScaler #Hotstuff #Citrix #News
##I don't know who uses #Citrix Netscalers any longer, but if you do, you've got some work to do to ensure that they are secure. The post describes the work you have to do -- in addition to applying the appropriate patches -- to address recent vulnerabilities. #cybersecurity
https://www.deyda.net/index.php/en/2025/06/17/checklist-for-netscaler-citrix-adc-cve-2025-5777/
##updated 2025-06-17T15:31:16
2 posts
Citrix on this one:
"At this time, there have been no reports or indications that the vulnerabilities described in CTX693420 (CVE-2025-5349 and CVE-2025-5777) are being actively exploited in the wild. However, due to the critical severity of these issues (CVSS scores of 8.7 and 9.3), We strongly recommends that affected customers apply the updated patches immediately to mitigate any potential risks."
##Critical vulnerabilities discovered in Citrix NetScaler ADC and Gateway products
Citrix has patched two critical vulnerabilities in NetScaler ADC and Gateway products, including an unauthenticated memory overread flaw (CVE-2025-5777) that could expose sensitive data and an access control bypass on the management interface (CVE-2025-5349). The company strongly urges updates for customer-managed instances.
**If you have self-hosted Citrix NetScaler ADC or Gateway, check if your version is still supported and apply the security patches. This is especially important if your Citrix functions as a gateway/VPN server. Take note that versions 12.1 and 13.0 are end-of-life with no fixes available. After patching, restart all active user sessions to clear any potential compromises from these critical vulnerabilities.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerabilities-discovered-in-citrix-netscaler-adc-and-gateway-products-4-l-a-4-n/gD2P6Ple2L
updated 2025-06-16T21:32:22
1 posts
2 repos
updated 2025-06-10T21:31:31
1 posts
Critical build cache flaw exposes organizations to production code injection attacks
Security researchers at Nx have disclosed a critical vulnerability (CVE-2025-36852) nicknamed "CREEP" that exploits the "first-to-cache wins" principle in remote caching systems, allowing any developer with pull request access to inject malicious code into production environments through race conditions in shared build cache infrastructure. The vulnerability affects organizations using popular build tools with remote caching on platforms like Amazon S3 and Google Cloud Storage.
**If your CI/CD system uses remote caching (like S3 or Google Cloud Storage) review whether pull request builds can write to the same cache used by production builds. You may not want to do anything and be optimistic, but ideally consider disabling cache writes from untrusted pull request environments or implement isolated cache namespaces so PRs can only read from production cache but write to their own separate cache space.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-build-cache-flaw-exposes-organizations-to-production-code-injection-attacks-9-f-q-5-x/gD2P6Ple2L
updated 2025-06-09T19:06:12
1 posts
Malcolm v25.06.0 includes a some new and oft-requested features, bug fixes, and component version bumps.
NOTE: As this Malcolm release enables the OpenSearch Security Plugin as described below, even inter-container access to OpenSearch must now be authenticated when using Malcolm's embedded OpenSearch instance. To accomplish this, an internal-use-only account and password is used for connecting to OpenSearch by Malcolm's other components as needed. This credential (saved in .opensearch.primary.curlrc in the Malcolm installation directory) needs to be generated before Malcolm starts up the first time after upgrading. To do so, please run ./scripts/auth_setup and select (Re)generate internal passwords for local primary OpenSearch instance. This credential is only used internally for OpenSearch and cannot be used to remotely access Malcolm.
keycloak or keycloak_remote. With other authentication methods such as HTTP basic or LDAP, or when RBAC is disabled, all Malcolm users effectively have administrator privileges../config/keycloak.env.db.pl and also use them for Malcolm's creation of its own index templates (cisagov/Malcolm#692)intel.log with additional fields using corelight/ExtendIntel (part 1) (cisagov/Malcolm#502)intel.log to the user. Further work to do so will be continued in cisagov/Malcolm#695.sec_token_id field (cisagov/icsnpp-opcua-binary#101)kafka.zeek) to make it easier to override in Docker using a volume bind mount or in K8s using a configMap.Concurrent::Hash to Concurrent::Map for better performancerobots.txt file to avoid web crawlers/readme is trying to pull fonts from use.fontawesome.com (cisagov/Malcolm#694)config.ini setting maxFileSizeG from PCAP_ROTATE_MEGABYTESMalcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻♀️.
Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.
Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.
As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.
#Malcolm #HedgehogLinux #rbac #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL #DHS #CISA #CISAgov
##updated 2025-06-04T18:31:04
1 posts
Cisco posted this yesterday:
Cisco Identity Services Engine Arbitrary File Upload Vulnerability - CVE-2025-20130 (medium) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-P4M8vwXY @TalosSecurity #cybersecurity #infosec
##updated 2025-05-20T06:32:23
1 posts
3 repos
https://github.com/B1ack4sh/Blackash-CVE-2025-4322
Active exploitation of critically vulnerable WordPress Motors theme
WordPress sites using the "Motors" automotive theme are under active attack through a critical privilege escalation vulnerability (CVE-2025-4322) that allows unauthenticated attackers to hijack administrator accounts by changing passwords without proper validation. Since mass exploitation began on June 7, 2025, Wordfence has blocked over 23,100 exploit attempts.
**If you are running Motors theme on your Wordpress, update IMMEDIATELY! Your site is vulnerable and hackers are attacking it. Don't delay this one, it urgent and important!**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/active-exploitation-of-critically-vulnerable-wordpress-motors-theme-2-9-p-u-4/gD2P6Ple2L
updated 2025-05-17T18:57:13
1 posts
Malcolm v25.06.0 includes a some new and oft-requested features, bug fixes, and component version bumps.
NOTE: As this Malcolm release enables the OpenSearch Security Plugin as described below, even inter-container access to OpenSearch must now be authenticated when using Malcolm's embedded OpenSearch instance. To accomplish this, an internal-use-only account and password is used for connecting to OpenSearch by Malcolm's other components as needed. This credential (saved in .opensearch.primary.curlrc in the Malcolm installation directory) needs to be generated before Malcolm starts up the first time after upgrading. To do so, please run ./scripts/auth_setup and select (Re)generate internal passwords for local primary OpenSearch instance. This credential is only used internally for OpenSearch and cannot be used to remotely access Malcolm.
keycloak or keycloak_remote. With other authentication methods such as HTTP basic or LDAP, or when RBAC is disabled, all Malcolm users effectively have administrator privileges../config/keycloak.env.db.pl and also use them for Malcolm's creation of its own index templates (cisagov/Malcolm#692)intel.log with additional fields using corelight/ExtendIntel (part 1) (cisagov/Malcolm#502)intel.log to the user. Further work to do so will be continued in cisagov/Malcolm#695.sec_token_id field (cisagov/icsnpp-opcua-binary#101)kafka.zeek) to make it easier to override in Docker using a volume bind mount or in K8s using a configMap.Concurrent::Hash to Concurrent::Map for better performancerobots.txt file to avoid web crawlers/readme is trying to pull fonts from use.fontawesome.com (cisagov/Malcolm#694)config.ini setting maxFileSizeG from PCAP_ROTATE_MEGABYTESMalcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻♀️.
Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.
Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.
As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.
#Malcolm #HedgehogLinux #rbac #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL #DHS #CISA #CISAgov
##updated 2025-05-17T18:55:58
1 posts
Malcolm v25.06.0 includes a some new and oft-requested features, bug fixes, and component version bumps.
NOTE: As this Malcolm release enables the OpenSearch Security Plugin as described below, even inter-container access to OpenSearch must now be authenticated when using Malcolm's embedded OpenSearch instance. To accomplish this, an internal-use-only account and password is used for connecting to OpenSearch by Malcolm's other components as needed. This credential (saved in .opensearch.primary.curlrc in the Malcolm installation directory) needs to be generated before Malcolm starts up the first time after upgrading. To do so, please run ./scripts/auth_setup and select (Re)generate internal passwords for local primary OpenSearch instance. This credential is only used internally for OpenSearch and cannot be used to remotely access Malcolm.
keycloak or keycloak_remote. With other authentication methods such as HTTP basic or LDAP, or when RBAC is disabled, all Malcolm users effectively have administrator privileges../config/keycloak.env.db.pl and also use them for Malcolm's creation of its own index templates (cisagov/Malcolm#692)intel.log with additional fields using corelight/ExtendIntel (part 1) (cisagov/Malcolm#502)intel.log to the user. Further work to do so will be continued in cisagov/Malcolm#695.sec_token_id field (cisagov/icsnpp-opcua-binary#101)kafka.zeek) to make it easier to override in Docker using a volume bind mount or in K8s using a configMap.Concurrent::Hash to Concurrent::Map for better performancerobots.txt file to avoid web crawlers/readme is trying to pull fonts from use.fontawesome.com (cisagov/Malcolm#694)config.ini setting maxFileSizeG from PCAP_ROTATE_MEGABYTESMalcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻♀️.
Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.
Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.
As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.
#Malcolm #HedgehogLinux #rbac #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL #DHS #CISA #CISAgov
##updated 2025-05-16T09:30:42
2 posts
Vulnerability in Synology Active Backup for Microsoft 365 exposes credentials, enables unauthorized access to Teams chats
Security researchers discovered a vulnerability (CVE-2025-4679) in Synology's Active Backup for Microsoft 365 that exposed a master credential in HTTP redirects, allowing attackers to gain unauthorized access to sensitive Microsoft 365 data across all organizations using the popular backup solution with over 1.2 million installations.
**If you use Synology's Active Backup for Microsoft 365, be aware that a critical flaw exposed your Microsoft 365 data to potential unauthorized access until recently. Even though Synology says they've fixed it, check your Microsoft 365 audit logs for any suspicious access and ensure your Synology system is fully updated. If developing applications, check if any of your responses contains secrets that shouldn't be there.**
#cybersecurity #infosec #advisory #databreach
https://beyondmachines.net/event_details/vulnerability-in-synology-active-backup-for-microsoft-365-exposes-credentials-enables-unauthorized-access-to-teams-chats-k-0-f-g-g/gD2P6Ple2L
Vulnerability in Synology Active Backup for Microsoft 365 exposes credentials, enables unauthorized access to Teams chats
Security researchers discovered a vulnerability (CVE-2025-4679) in Synology's Active Backup for Microsoft 365 that exposed a master credential in HTTP redirects, allowing attackers to gain unauthorized access to sensitive Microsoft 365 data across all organizations using the popular backup solution with over 1.2 million installations.
**If you use Synology's Active Backup for Microsoft 365, be aware that a critical flaw exposed your Microsoft 365 data to potential unauthorized access until recently. Even though Synology says they've fixed it, check your Microsoft 365 audit logs for any suspicious access and ensure your Synology system is fully updated. If developing applications, check if any of your responses contains secrets that shouldn't be there.**
#cybersecurity #infosec #advisory #databreach
https://beyondmachines.net/event_details/vulnerability-in-synology-active-backup-for-microsoft-365-exposes-credentials-enables-unauthorized-access-to-teams-chats-k-0-f-g-g/gD2P6Ple2L
updated 2025-05-14T21:31:25
1 posts
4 repos
https://github.com/wiseep/CVE-2025-0133
https://github.com/INTELEON404/CVE-2025-0133
https://github.com/dodiorne/cve-2025-0133
https://github.com/ynsmroztas/-CVE-2025-0133-GlobalProtect-XSS
updated 2025-05-13T18:30:59
1 posts
2 repos
https://github.com/watchtowrlabs/watchTowr-vs-Ivanti-EPMM-CVE-2025-4427-CVE-2025-4428
During various Ivanti Endpoint Manager Mobile investigations (CVE-2025-4428), we (as others in our field) saw that the threat actors dumped heap memory from the Tomcat Java processes using jcmd, in order to search the dumped data for sensitive information.
Have others seen this behavior in other campaigns, from other actors? Dumping heap memory to steal sensitive information? Elastic, for example, does not have an (open source) rule for jcmd.
Example command:
ps ax | grep java | grep tomcat | awk '{print $1}' | while read p; do jcmd $p GC.heap_dump /tmp/th.$p; done;
updated 2025-05-12T17:32:32.760000
1 posts
Critical vulnerability in Insomnia API client enables arbitrary code execution
A critical template injection vulnerability (CVE-2025-1087) in the Insomnia API Client allows attackers to execute arbitrary code through malicious collection files, UI fields, or HTTP cookies. Researchers have successfully bypassed three separate mitigation attempts by Kong since February 2025. Despite multiple patches, the vulnerability remains exploitable in the latest version 11.2.0 as of June 2025.
**If you're using Insomnia API Client, consider switching to an alternative like Postman or Bruno since this code execution vulnerability has been bypassed multiple times despite vendor patches and can cause your computer to execute malicious code. If you must continue using Insomnia, never import collection files from untrusted sources and avoid sending requests to unknown servers that could inject malicious cookies.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerability-in-insomnia-api-client-enables-arbitrary-code-execution-d-v-d-j-3/gD2P6Ple2L
updated 2025-05-07T16:24:00.917000
2 posts
18 repos
https://github.com/ynsmroztas/CVE-2025-3248-Langflow-RCE
https://github.com/vigilante-1337/CVE-2025-3248
https://github.com/Praison001/CVE-2025-3248
https://github.com/PuddinCat/CVE-2025-3248-POC
https://github.com/Vip3rLi0n/CVE-2025-3248
https://github.com/0-d3y/langflow-rce-exploit
https://github.com/zapstiko/CVE-2025-3248
https://github.com/verylazytech/CVE-2025-3248
https://github.com/xuemian168/CVE-2025-3248
https://github.com/imbas007/CVE-2025-3248
https://github.com/dennisec/CVE-2025-3248
https://github.com/B1ack4sh/Blackash-CVE-2025-3248
https://github.com/ill-deed/Langflow-CVE-2025-3248-Multi-target
https://github.com/dennisec/Mass-CVE-2025-3248
https://github.com/tiemio/RCE-CVE-2025-3248
https://github.com/issamjr/CVE-2025-3248-Scanner
🚨CVE-2025-3248: RCE vulnerability in Langflow
Link: https://www.zoomeye.ai/searchResult?q=YXBwPSJMYW5nZmxvdyI%3D
ZoomEye Dork: app="Langflow"
Results: 1,862
Advisory: https://github.com/advisories/GHSA-rvqx-wpfh-mfx7
PoC: https://github.com/ynsmroztas/CVE-2025-3248-Langflow-RCE
CVSS: 9.3
——————————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership. 💙
##🚨CVE-2025-3248: RCE vulnerability in Langflow
Link: https://www.zoomeye.ai/searchResult?q=YXBwPSJMYW5nZmxvdyI%3D
ZoomEye Dork: app="Langflow"
Results: 1,862
Advisory: https://github.com/advisories/GHSA-rvqx-wpfh-mfx7
PoC: https://github.com/ynsmroztas/CVE-2025-3248-Langflow-RCE
CVSS: 9.3
——————————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership. 💙
##updated 2025-05-02T15:31:52
1 posts
#OT #Advisory VDE-2025-046
Pilz: Authentication Bypass and Cross-Site-Scripting in PiCtory
#CVE CVE-2025-32011, CVE-2025-35996, CVE-2025-36558
https://certvde.com/en/advisories/VDE-2025-046
#CSAF https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-001.json
##updated 2025-05-02T15:31:45
1 posts
#OT #Advisory VDE-2025-046
Pilz: Authentication Bypass and Cross-Site-Scripting in PiCtory
#CVE CVE-2025-32011, CVE-2025-35996, CVE-2025-36558
https://certvde.com/en/advisories/VDE-2025-046
#CSAF https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-001.json
##updated 2025-05-02T13:52:51.693000
1 posts
#OT #Advisory VDE-2025-046
Pilz: Authentication Bypass and Cross-Site-Scripting in PiCtory
#CVE CVE-2025-32011, CVE-2025-35996, CVE-2025-36558
https://certvde.com/en/advisories/VDE-2025-046
#CSAF https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-001.json
##updated 2025-04-10T16:56:46.083000
1 posts
99 repos
https://github.com/Aur3ns/Block-Spring4Shell
https://github.com/zangcc/CVE-2022-22965-rexbb
https://github.com/kh4sh3i/Spring-CVE
https://github.com/Qualys/spring4scanwin
https://github.com/irgoncalves/f5-waf-enforce-sig-Spring4Shell
https://github.com/LudovicPatho/CVE-2022-22965_Spring4Shell
https://github.com/Mr-xn/spring-core-rce
https://github.com/irgoncalves/irule-cve-2022-22965
https://github.com/HackJava/Spring
https://github.com/nu0l/CVE-2022-22965
https://github.com/sinjap/spring4shell
https://github.com/wikiZ/springboot_CVE-2022-22965
https://github.com/cxzero/CVE-2022-22965-spring4shell
https://github.com/Snip3R69/spring-shell-vuln
https://github.com/jschauma/check-springshell
https://github.com/devengpk/CVE-2022-22965
https://github.com/Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965-
https://github.com/mariomamo/CVE-2022-22965
https://github.com/zer0yu/CVE-2022-22965
https://github.com/Kirill89/CVE-2022-22965-PoC
https://github.com/viniciuspereiras/CVE-2022-22965-poc
https://github.com/itsecurityco/CVE-2022-22965
https://github.com/TheGejr/SpringShell
https://github.com/brunoh6/web-threat-mitigation
https://github.com/fracturelabs/spring4shell_victim
https://github.com/colincowie/Safer_PoC_CVE-2022-22965
https://github.com/luoqianlin/CVE-2022-22965
https://github.com/mwojterski/cve-2022-22965
https://github.com/c4mx/CVE-2022-22965_PoC
https://github.com/khulnasoft-lab/awesome-security
https://github.com/tangxiaofeng7/CVE-2022-22965-Spring-Core-Rce
https://github.com/FourCoreLabs/spring4shell-exploit-poc
https://github.com/lcarea/CVE-2022-22965
https://github.com/p1ckzi/CVE-2022-22965
https://github.com/ZapcoMan/spring4shell-vulnerable-application
https://github.com/Enokiy/spring-RCE-CVE-2022-22965
https://github.com/delyee/Spring4Shell
https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
https://github.com/fracturelabs/go-scan-spring
https://github.com/SecNN/SpringFramework_CVE-2022-22965_RCE
https://github.com/CalumHutton/CVE-2022-22965-PoC_Payara
https://github.com/snicoll-scratches/spring-boot-cve-2022-22965
https://github.com/Joe1sn/CVE-2022-22965
https://github.com/bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-
https://github.com/0xr1l3s/CVE-2022-22965
https://github.com/BobTheShoplifter/Spring4Shell-POC
https://github.com/LucasPDiniz/CVE-2022-22965
https://github.com/WuliRuler/SBSCAN
https://github.com/west-wind/Spring4Shell-Detection
https://github.com/reznok/Spring4Shell-POC
https://github.com/BKLockly/CVE-2022-22965
https://github.com/netcode/Spring4shell-CVE-2022-22965-POC
https://github.com/DanielFEXKEX/CVE-Scanner
https://github.com/sohamsharma966/Spring4Shell-CVE-2022-22965
https://github.com/rwincey/spring4shell-CVE-2022-22965
https://github.com/liangyueliangyue/spring-core-rce
https://github.com/likewhite/CVE-2022-22965
https://github.com/daniel0x00/Invoke-CVE-2022-22965-SafeCheck
https://github.com/Loneyers/Spring4Shell
https://github.com/sunnyvale-it/CVE-2022-22965-PoC
https://github.com/xsxtw/SpringFramework_CVE-2022-22965_RCE
https://github.com/gokul-ramesh/Spring4Shell-PoC-exploit
https://github.com/ajith737/Spring4Shell-CVE-2022-22965-POC
https://github.com/jashan-lefty/Spring4Shell
https://github.com/Bouquets-ai/CVE-2022-22965-GUItools
https://github.com/gpiechnik2/nmap-spring4shell
https://github.com/t3amj3ff/Spring4ShellPoC
https://github.com/e21-AS/telstra-cybersecurity-experience
https://github.com/ESSAFAR/Firewall-Rules
https://github.com/GuayoyoCyber/CVE-2022-22965
https://github.com/alt3kx/CVE-2022-22965_PoC
https://github.com/guigui237/Expoitation-de-la-vuln-rabilit-CVE-2022-22965
https://github.com/te5t321/Spring4Shell-CVE-2022-22965.py
https://github.com/k3rwin/spring-core-rce
https://github.com/datawiza-inc/spring-rec-demo
https://github.com/helsecert/CVE-2022-22965
https://github.com/iloveflag/Fast-CVE-2022-22965
https://github.com/anair-it/springshell-vuln-POC
https://github.com/c33dd/CVE-2022-22965
https://github.com/me2nuk/CVE-2022-22965
https://github.com/mebibite/springhound
https://github.com/DDuarte/springshell-rce-poc
https://github.com/AabyssZG/SpringBoot-Scan
https://github.com/0xrobiul/CVE-2022-22965
https://github.com/jakabakos/CVE-2022-22965-Spring4Shell
https://github.com/wshon/spring-framework-rce
https://github.com/D1mang/Spring4Shell-CVE-2022-22965
https://github.com/alt3kx/CVE-2022-22965
https://github.com/tpt11fb/SpringVulScan
https://github.com/dbgee/Spring4Shell
https://github.com/XuCcc/VulEnv
https://github.com/wjl110/CVE-2022-22965_Spring_Core_RCE
https://github.com/Wrin9/CVE-2022-22965
https://github.com/twseptian/cve-2022-22965
https://github.com/ClemExp/CVE-2022-22965-PoC
https://github.com/fransvanbuul/CVE-2022-22965-susceptibility
https://github.com/khidottrivi/CVE-2022-22965
An attacker downloaded a freely available webshell from GitHub and stored it under the installation path of the legitimate SAP installation in the recent SAP Visual Composer exploitation, "disguised" as a PHPMyAdmin file (see image).
The code itself is relatively simple, accepting a base64-encoded class via HTTP on a specified parameter, to dynamically load and run that class.
That type of Webshell, from the AntSwordProject [1], was also named by Mandiant last year in conjunction with an investigated APT41 intrusion, as well as in some reports from PaloAlto [2,3,4].
Given that most Linux servers are not equipped with an EDR or an AV, how would you detect such a webshell on your servers? The curated YARA rule from Florian Roth is a good starting point for hunting through your web and application folders to find hidden malicious files. [5] Velociraptor's Yara artifact is one example of how to accomplish this.
[1] https://github.com/AntSwordProject
[2] https://cloud.google.com/blog/topics/threat-intelligence/apt41-arisen-from-dust
[3] https://unit42.paloaltonetworks.com/cve-2022-22965-springshell/
[4] https://unit42.paloaltonetworks.com/actors-still-exploiting-sharepoint-vulnerability/
[5] https://raw.githubusercontent.com/Neo23x0/signature-base/a065133ff5763435e4e9e0f6bc72344c44b1824f/yara/gen_webshells.yar
updated 2025-04-03T19:15:43.560000
1 posts
4 repos
https://github.com/JoyGhoshs/CVE-2021-40870
https://github.com/orangmuda/CVE-2021-40870
Something like 10 years ago, I noticed that if you looked at the commit counts on #Metasploit modules, you'd get a good idea of what modules people were actually using and wanting to improve. The idea being, these were modules that pentesters were actually using on site, and something about them bugged someone enough to put in a fix (maybe a missing target, or more options, or whatever).
I just looked again today after a conversation with @sawaba, and also looked at #Nuclei templates. Here's the top 10 of each, limited to the last 5 years worth of commits, excluding GitHub actions.
Whatcha think? Interesting?
exploits/multi/http/papercut_ng_auth_bypass.rb 38
exploits/multi/http/open_web_analytics_rce.rb 37
exploits/windows/local/bits_ntlm_token_impersonation.rb 37
exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb 32
exploits/linux/local/sudo_baron_samedit.rb 31
exploits/unix/webapp/openmediavault_rpc_rce.rb 29
exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb 28
exploits/linux/http/empire_skywalker.rb 28
exploits/multi/http/log4shell_header_injection.rb 26
exploits/windows/http/exchange_proxylogon_rce.rb 26
./http/cves/2019/CVE-2019-17382.yaml 27
./http/cves/2021/CVE-2021-40822.yaml 27
./http/cves/2023/CVE-2023-27034.yaml 27
./http/cves/2021/CVE-2021-43798.yaml 27
./http/cves/2023/CVE-2023-32243.yaml 27
./http/cves/2021/CVE-2021-40870.yaml 26
./network/cves/2016/CVE-2016-3510.yaml 26
./http/cves/2021/CVE-2021-28164.yaml 26
./network/cves/2020/CVE-2020-1938.yaml 26
./http/cves/2022/CVE-2022-23854.yaml 25
## updated 2025-03-25T15:10:16
1 posts
22 repos
https://github.com/B1ack4sh/Blackash-CVE-2025-1974
https://github.com/zulloper/CVE-2025-1974
https://github.com/dttuss/IngressNightmare-RCE-POC
https://github.com/Ar05un05kau05ndal/2025-1
https://github.com/Rubby2001/CVE-2025-1974-go
https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps
https://github.com/hi-unc1e/CVE-2025-1974-poc
https://github.com/rjhaikal/POC-IngressNightmare-CVE-2025-1974
https://github.com/gian2dchris/ingress-nightmare-poc
https://github.com/m-q-t/ingressnightmare-detection-poc
https://github.com/tuladhar/ingress-nightmare
https://github.com/0xBingo/CVE-2025-1974
https://github.com/abrewer251/CVE-2025-1974_IngressNightmare_PoC
https://github.com/yoshino-s/CVE-2025-1974
https://github.com/Rickerd12/exploit-cve-2025-1974
https://github.com/hakaioffsec/IngressNightmare-PoC
https://github.com/sandumjacob/IngressNightmare-POCs
https://github.com/salt318/CVE-2025-1974
https://github.com/yanmarques/CVE-2025-1974
https://github.com/zwxxb/CVE-2025-1974
ingress-nginx CVE-2025-1974 vulnerability allows unauthenticated remote access to its admission controller, enabling full Kubernetes cluster takeover via RCE
Mitigation requires urgent patching, network hardening, and audit log inspection
##updated 2025-03-20T10:15:34.120000
1 posts
Malcolm v25.06.0 includes a some new and oft-requested features, bug fixes, and component version bumps.
NOTE: As this Malcolm release enables the OpenSearch Security Plugin as described below, even inter-container access to OpenSearch must now be authenticated when using Malcolm's embedded OpenSearch instance. To accomplish this, an internal-use-only account and password is used for connecting to OpenSearch by Malcolm's other components as needed. This credential (saved in .opensearch.primary.curlrc in the Malcolm installation directory) needs to be generated before Malcolm starts up the first time after upgrading. To do so, please run ./scripts/auth_setup and select (Re)generate internal passwords for local primary OpenSearch instance. This credential is only used internally for OpenSearch and cannot be used to remotely access Malcolm.
keycloak or keycloak_remote. With other authentication methods such as HTTP basic or LDAP, or when RBAC is disabled, all Malcolm users effectively have administrator privileges../config/keycloak.env.db.pl and also use them for Malcolm's creation of its own index templates (cisagov/Malcolm#692)intel.log with additional fields using corelight/ExtendIntel (part 1) (cisagov/Malcolm#502)intel.log to the user. Further work to do so will be continued in cisagov/Malcolm#695.sec_token_id field (cisagov/icsnpp-opcua-binary#101)kafka.zeek) to make it easier to override in Docker using a volume bind mount or in K8s using a configMap.Concurrent::Hash to Concurrent::Map for better performancerobots.txt file to avoid web crawlers/readme is trying to pull fonts from use.fontawesome.com (cisagov/Malcolm#694)config.ini setting maxFileSizeG from PCAP_ROTATE_MEGABYTESMalcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻♀️.
Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.
Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.
As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.
#Malcolm #HedgehogLinux #rbac #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL #DHS #CISA #CISAgov
##updated 2025-03-13T21:15:43.127000
1 posts
This post analyzes CVE-2025-1767, a Kubernetes vulnerability where gitRepo volumes let pods clone any host-local Git repo if the attacker knows the path
##updated 2025-02-13T17:15:38.600000
1 posts
Something like 10 years ago, I noticed that if you looked at the commit counts on #Metasploit modules, you'd get a good idea of what modules people were actually using and wanting to improve. The idea being, these were modules that pentesters were actually using on site, and something about them bugged someone enough to put in a fix (maybe a missing target, or more options, or whatever).
I just looked again today after a conversation with @sawaba, and also looked at #Nuclei templates. Here's the top 10 of each, limited to the last 5 years worth of commits, excluding GitHub actions.
Whatcha think? Interesting?
exploits/multi/http/papercut_ng_auth_bypass.rb 38
exploits/multi/http/open_web_analytics_rce.rb 37
exploits/windows/local/bits_ntlm_token_impersonation.rb 37
exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb 32
exploits/linux/local/sudo_baron_samedit.rb 31
exploits/unix/webapp/openmediavault_rpc_rce.rb 29
exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb 28
exploits/linux/http/empire_skywalker.rb 28
exploits/multi/http/log4shell_header_injection.rb 26
exploits/windows/http/exchange_proxylogon_rce.rb 26
./http/cves/2019/CVE-2019-17382.yaml 27
./http/cves/2021/CVE-2021-40822.yaml 27
./http/cves/2023/CVE-2023-27034.yaml 27
./http/cves/2021/CVE-2021-43798.yaml 27
./http/cves/2023/CVE-2023-32243.yaml 27
./http/cves/2021/CVE-2021-40870.yaml 26
./network/cves/2016/CVE-2016-3510.yaml 26
./http/cves/2021/CVE-2021-28164.yaml 26
./network/cves/2020/CVE-2020-1938.yaml 26
./http/cves/2022/CVE-2022-23854.yaml 25
## updated 2025-01-14T03:31:48
2 posts
The vulnerabilities, tracked as CVE-2025-0055 and CVE-2025-0056 (CVSS scores: 6.0), were patched by SAP as part of its monthly updates for January 2025. https://thehackernews.com/2025/06/citrix-bleed-2-flaw-enables-token-theft.html
##These have been patched.
Pathlock: Responsible Disclosure: Vulnerabilities in SAP GUI Client (CVE-2025-0056 & CVE-2025-0055) https://pathlock.com/blog/security-alerts/cve-2025-0055-and-2025-0056/
More:
The Hacker News: Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure https://thehackernews.com/2025/06/citrix-bleed-2-flaw-enables-token-theft.html @thehackernews #cybersecurity #Infosec #Windows #Java
##updated 2025-01-14T01:15:15.730000
2 posts
The vulnerabilities, tracked as CVE-2025-0055 and CVE-2025-0056 (CVSS scores: 6.0), were patched by SAP as part of its monthly updates for January 2025. https://thehackernews.com/2025/06/citrix-bleed-2-flaw-enables-token-theft.html
##These have been patched.
Pathlock: Responsible Disclosure: Vulnerabilities in SAP GUI Client (CVE-2025-0056 & CVE-2025-0055) https://pathlock.com/blog/security-alerts/cve-2025-0055-and-2025-0056/
More:
The Hacker News: Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure https://thehackernews.com/2025/06/citrix-bleed-2-flaw-enables-token-theft.html @thehackernews #cybersecurity #Infosec #Windows #Java
##updated 2024-12-23T20:38:21
2 posts
Woohoo! Another perfect 10 from last week. And this could hit hard. 🥳
https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.
Woohoo! Another perfect 10 from last week. And this could hit hard. 🥳
https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.
updated 2024-11-21T08:10:57.087000
2 posts
New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if needed
Scanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
##New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if needed
Scanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
##updated 2024-11-21T07:52:12.807000
1 posts
Something like 10 years ago, I noticed that if you looked at the commit counts on #Metasploit modules, you'd get a good idea of what modules people were actually using and wanting to improve. The idea being, these were modules that pentesters were actually using on site, and something about them bugged someone enough to put in a fix (maybe a missing target, or more options, or whatever).
I just looked again today after a conversation with @sawaba, and also looked at #Nuclei templates. Here's the top 10 of each, limited to the last 5 years worth of commits, excluding GitHub actions.
Whatcha think? Interesting?
exploits/multi/http/papercut_ng_auth_bypass.rb 38
exploits/multi/http/open_web_analytics_rce.rb 37
exploits/windows/local/bits_ntlm_token_impersonation.rb 37
exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb 32
exploits/linux/local/sudo_baron_samedit.rb 31
exploits/unix/webapp/openmediavault_rpc_rce.rb 29
exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb 28
exploits/linux/http/empire_skywalker.rb 28
exploits/multi/http/log4shell_header_injection.rb 26
exploits/windows/http/exchange_proxylogon_rce.rb 26
./http/cves/2019/CVE-2019-17382.yaml 27
./http/cves/2021/CVE-2021-40822.yaml 27
./http/cves/2023/CVE-2023-27034.yaml 27
./http/cves/2021/CVE-2021-43798.yaml 27
./http/cves/2023/CVE-2023-32243.yaml 27
./http/cves/2021/CVE-2021-40870.yaml 26
./network/cves/2016/CVE-2016-3510.yaml 26
./http/cves/2021/CVE-2021-28164.yaml 26
./network/cves/2020/CVE-2020-1938.yaml 26
./http/cves/2022/CVE-2022-23854.yaml 25
## updated 2024-07-25T13:37:10
1 posts
38 repos
https://github.com/w4fz5uck5/CVE-2020-1938-Clean-Version
https://github.com/zhzyker/exphub
https://github.com/acodervic/CVE-2020-1938-MSF-MODULE
https://github.com/streghstreek/CVE-2020-1938
https://github.com/tpt11fb/AttackTomcat
https://github.com/jptr218/ghostcat
https://github.com/hopsypopsy8/CVE-2020-1938-Exploitation
https://github.com/einzbernnn/CVE-2020-1938Scan
https://github.com/xindongzhuaizhuai/CVE-2020-1938
https://github.com/Neko-chanQwQ/CVE-2020-1938
https://github.com/sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read
https://github.com/doggycheng/CNVD-2020-10487
https://github.com/erickrr-bd/Apache-Tomcat-Ghostcat-Vulnerability
https://github.com/lizhianyuguangming/TomcatScanPro
https://github.com/shaunmclernon/ghostcat-verification
https://github.com/00theway/Ghostcat-CNVD-2020-10487
https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner
https://github.com/laolisafe/CVE-2020-1938
https://github.com/WHtig3r/CVE-2020-1938
https://github.com/Just1ceP4rtn3r/CVE-2020-1938-Tool
https://github.com/delsadan/CNVD-2020-10487-Bulk-verification
https://github.com/whatboxapp/GhostCat-LFI-exp
https://github.com/dacade/CVE-2020-1938
https://github.com/I-Runtime-Error/CVE-2020-1938
https://github.com/hypn0s/AJPy
https://github.com/MateoSec/ghostcatch
https://github.com/fatal0/tomcat-cve-2020-1938-check
https://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat
https://github.com/b1cat/CVE_2020_1938_ajp_poc
https://github.com/LandGrey/ClassHound
https://github.com/sgdream/CVE-2020-1938
https://github.com/YounesTasra-R4z3rSw0rd/CVE-2020-1938
https://github.com/haerin7427/CVE_2020_1938
https://github.com/Umesh2807/Ghostcat
https://github.com/h7hac9/CVE-2020-1938
https://github.com/Warelock/cve-2020-1938
Something like 10 years ago, I noticed that if you looked at the commit counts on #Metasploit modules, you'd get a good idea of what modules people were actually using and wanting to improve. The idea being, these were modules that pentesters were actually using on site, and something about them bugged someone enough to put in a fix (maybe a missing target, or more options, or whatever).
I just looked again today after a conversation with @sawaba, and also looked at #Nuclei templates. Here's the top 10 of each, limited to the last 5 years worth of commits, excluding GitHub actions.
Whatcha think? Interesting?
exploits/multi/http/papercut_ng_auth_bypass.rb 38
exploits/multi/http/open_web_analytics_rce.rb 37
exploits/windows/local/bits_ntlm_token_impersonation.rb 37
exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb 32
exploits/linux/local/sudo_baron_samedit.rb 31
exploits/unix/webapp/openmediavault_rpc_rce.rb 29
exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb 28
exploits/linux/http/empire_skywalker.rb 28
exploits/multi/http/log4shell_header_injection.rb 26
exploits/windows/http/exchange_proxylogon_rce.rb 26
./http/cves/2019/CVE-2019-17382.yaml 27
./http/cves/2021/CVE-2021-40822.yaml 27
./http/cves/2023/CVE-2023-27034.yaml 27
./http/cves/2021/CVE-2021-43798.yaml 27
./http/cves/2023/CVE-2023-32243.yaml 27
./http/cves/2021/CVE-2021-40870.yaml 26
./network/cves/2016/CVE-2016-3510.yaml 26
./http/cves/2021/CVE-2021-28164.yaml 26
./network/cves/2020/CVE-2020-1938.yaml 26
./http/cves/2022/CVE-2022-23854.yaml 25
## updated 2024-06-27T12:30:43
2 posts
14 repos
https://github.com/orilevy8/cve-2023-0386
https://github.com/Satheesh575555/linux-4.19.72_CVE-2023-0386
https://github.com/Anekant-Singhai/Exploits
https://github.com/veritas501/CVE-2023-0386
https://github.com/chenaotian/CVE-2023-0386
https://github.com/bchevCH/CVE-2023-0386
https://github.com/letsr00t/CVE-2023-0386
https://github.com/AiK1d/CVE-2023-0386
https://github.com/churamanib/CVE-2023-0386
https://github.com/Fanxiaoyao66/CVE-2023-0386
https://github.com/sxlmnwb/CVE-2023-0386
https://github.com/EstamelGG/CVE-2023-0386-libs
updated 2024-04-11T21:02:46
2 posts
3 repos
https://github.com/gquere/CVE-2019-6693
New.
CISA has added to the KEV catalogue. The usual suspects are back.
- CVE-2024-54085: AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-54085
- CVE-2024-0769: D-Link DIR-859 Router Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-0769
- CVE-2019-6693: Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability https://www.cve.org/CVERecord?id=CVE-2019-6693 #cybersecurity #CISA #infosec
##CVE ID: CVE-2019-6693
Vendor: Fortinet
Product: FortiOS
Date Added: 2025-06-25
Notes: https://fortiguard.com/advisory/FG-IR-19-007 ; https://nvd.nist.gov/vuln/detail/CVE-2019-6693
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2019-6693
updated 2024-04-04T05:42:42
1 posts
11 repos
https://github.com/little44n1o/cve-2023-32243
https://github.com/manavvedawala/CVE-2023-32243-proof-of-concept
https://github.com/YouGina/CVE-2023-32243
https://github.com/thatonesecguy/Wordpress-Vulnerability-Identification-Scripts
https://github.com/Jenderal92/WP-CVE-2023-32243
https://github.com/RandomRobbieBF/CVE-2023-32243
https://github.com/gbrsh/CVE-2023-32243
https://github.com/manavvedawala2/CVE-2023-32243-POC
https://github.com/manavvedawala2/CVE-2023-32243-proof-of-concept
https://github.com/dev0558/CVE-2023-32243-Detection-and-Mitigation-in-WordPress
Something like 10 years ago, I noticed that if you looked at the commit counts on #Metasploit modules, you'd get a good idea of what modules people were actually using and wanting to improve. The idea being, these were modules that pentesters were actually using on site, and something about them bugged someone enough to put in a fix (maybe a missing target, or more options, or whatever).
I just looked again today after a conversation with @sawaba, and also looked at #Nuclei templates. Here's the top 10 of each, limited to the last 5 years worth of commits, excluding GitHub actions.
Whatcha think? Interesting?
exploits/multi/http/papercut_ng_auth_bypass.rb 38
exploits/multi/http/open_web_analytics_rce.rb 37
exploits/windows/local/bits_ntlm_token_impersonation.rb 37
exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb 32
exploits/linux/local/sudo_baron_samedit.rb 31
exploits/unix/webapp/openmediavault_rpc_rce.rb 29
exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb 28
exploits/linux/http/empire_skywalker.rb 28
exploits/multi/http/log4shell_header_injection.rb 26
exploits/windows/http/exchange_proxylogon_rce.rb 26
./http/cves/2019/CVE-2019-17382.yaml 27
./http/cves/2021/CVE-2021-40822.yaml 27
./http/cves/2023/CVE-2023-27034.yaml 27
./http/cves/2021/CVE-2021-43798.yaml 27
./http/cves/2023/CVE-2023-32243.yaml 27
./http/cves/2021/CVE-2021-40870.yaml 26
./network/cves/2016/CVE-2016-3510.yaml 26
./http/cves/2021/CVE-2021-28164.yaml 26
./network/cves/2020/CVE-2020-1938.yaml 26
./http/cves/2022/CVE-2022-23854.yaml 25
## updated 2024-04-04T04:29:06
2 posts
11 repos
https://github.com/aditibv/MOVEit-CVE-2023-34362
https://github.com/horizon3ai/CVE-2023-34362
https://github.com/deepinstinct/MOVEit_CVE-2023-34362_IOCs
https://github.com/Chinyemba-ck/MOVEit-CVE-2023-34362
https://github.com/lithuanian-g/cve-2023-34362-iocs
https://github.com/glen-pearson/MoveIT-CVE-2023-34362-RCE
https://github.com/kenbuckler/MOVEit-CVE-2023-34362
https://github.com/errorfiathck/MOVEit-Exploit
https://github.com/sfewer-r7/CVE-2023-34362
https://github.com/toorandom/moveit-payload-decrypt-CVE-2023-34362
New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if needed
Scanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
##New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if needed
Scanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
##updated 2024-04-04T03:40:24
3 posts
2 repos
Zyxel Devices Hit by Active Exploits Targeting CVE-2023-28771 Vulnerability https://hackread.com/zyxel-devices-active-exploits-cve-2023-28771-vulnerability/
##Zyxel Devices Hit by Active Exploits Targeting CVE-2023-28771 Vulnerability https://hackread.com/zyxel-devices-active-exploits-cve-2023-28771-vulnerability/ #Cybersecurity #Vulnerability #CyberAttack #Security #Spoofing #Malware #Mirai #Zyxel #IoT
###Zyxel devices are under active attack via CVE-2023-28771. Researchers spotted a sudden spike in exploit attempts from 244 IPs, possibly tied to #Mirai botnet variants.
🔗 https://hackread.com/zyxel-devices-active-exploits-cve-2023-28771-vulnerability/
##updated 2024-02-03T05:07:29
1 posts
30 repos
https://github.com/W01fh4cker/CVE-2023-20198-RCE
https://github.com/reket99/Cisco_CVE-2023-20198
https://github.com/fox-it/cisco-ios-xe-implant-detection
https://github.com/Atea-Redteam/CVE-2023-20198
https://github.com/securityphoenix/cisco-CVE-2023-20198-tester
https://github.com/mr-r3b00t/CVE-2023-20198-IOS-XE-Scanner
https://github.com/raystr-atearedteam/CVE-2023-20198-checker
https://github.com/vulncheck-oss/cisco-ios-xe-implant-scanner
https://github.com/RevoltSecurities/CVE-2023-20198
https://github.com/emomeni/Simple-Ansible-for-CVE-2023-20198
https://github.com/Shadow0ps/CVE-2023-20198-Scanner
https://github.com/Vulnmachines/Cisco_CVE-2023-20198
https://github.com/G4sul1n/Cisco-IOS-XE-CVE-2023-20198
https://github.com/Tounsi007/CVE-2023-20198
https://github.com/Pushkarup/CVE-2023-20198
https://github.com/alekos3/CVE_2023_20198_Remediator
https://github.com/smokeintheshell/CVE-2023-20198
https://github.com/alekos3/CVE_2023_20198_Detector
https://github.com/IceBreakerCode/CVE-2023-20198
https://github.com/sanan2004/CVE-2023-20198
https://github.com/netbell/CVE-2023-20198-Fix
https://github.com/JoyGhoshs/CVE-2023-20198
https://github.com/Arshit01/CVE-2023-20198
https://github.com/ZephrFish/CVE-2023-20198-Checker
https://github.com/sohaibeb/CVE-2023-20198
https://github.com/ohlawd/CVE-2023-20198
https://github.com/kacem-expereo/CVE-2023-20198
Canadian Telco not patching year old RCE 🙄
“The Canadian Centre for Cyber Security and the FBI confirm that the Chinese state-sponsored 'Salt Typhoon' hacking group is also targeting Canadian telecommunication firms, breaching a telecom provider in February.
During the February 2025 incident, Salt Typhoon exploited the CVE-2023-20198 flaw, a critical Cisco IOS XE vulnerability allowing remote, unauthenticated attackers to create arbitrary accounts and gain admin-level privileges.”
##updated 2024-02-01T00:16:10
1 posts
50 repos
https://github.com/ravi5hanka/CVE-2021-43798-Exploit-for-Windows-and-Linux
https://github.com/Ryze-T/CVE-2021-43798
https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp
https://github.com/gixxyboy/CVE-2021-43798
https://github.com/k3rwin/CVE-2021-43798-Grafana
https://github.com/Sic4rio/Grafana-Decryptor-for-CVE-2021-43798
https://github.com/hxlxmj/Grafxploit
https://github.com/Iris288/CVE-2021-43798
https://github.com/halencarjunior/grafana-CVE-2021-43798
https://github.com/monke443/CVE-2021-43798
https://github.com/yasindce1998/grafana-cve-2021-43798
https://github.com/lfz97/CVE-2021-43798-Grafana-File-Read
https://github.com/K3ysTr0K3R/CVE-2021-43798-EXPLOIT
https://github.com/Jroo1053/GrafanaDirInclusion
https://github.com/LongWayHomie/CVE-2021-43798
https://github.com/hupe1980/CVE-2021-43798
https://github.com/ticofookfook/CVE-2021-43798
https://github.com/Mr-xn/CVE-2021-43798
https://github.com/Bouquets-ai/CVE-2021-43798
https://github.com/victorhorowitz/grafana-exploit-CVE-2021-43798
https://github.com/abuyazeen/CVE-2021-43798-Grafana-path-traversal-tester
https://github.com/s1gh/CVE-2021-43798
https://github.com/CLincat/vulcat
https://github.com/A-D-Team/grafanaExp
https://github.com/wagneralves/CVE-2021-43798
https://github.com/wezoomagency/GrafXploit
https://github.com/rnsss/CVE-2021-43798-poc
https://github.com/z3n70/CVE-2021-43798
https://github.com/davidr-io/Grafana-8.3-Directory-Traversal
https://github.com/suljov/Grafana-LFI-exploit
https://github.com/kenuosec/grafanaExp
https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC
https://github.com/rodpwn/CVE-2021-43798-mass_scanner
https://github.com/G01d3nW01f/CVE-2021-43798
https://github.com/Mo0ns/Grafana_POC-CVE-2021-43798
https://github.com/FAOG99/GrafanaDirectoryScanner
https://github.com/mauricelambert/LabAutomationCVE-2021-43798
https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798
https://github.com/katseyres2/CVE-2021-43798
https://github.com/MalekAlthubiany/CVE-2021-43798
https://github.com/aymenbouferroum/CVE-2021-43798_exploit
https://github.com/zer0yu/CVE-2021-43798
https://github.com/fanygit/Grafana-CVE-2021-43798Exp
https://github.com/lalkaltest/CVE-2021-43798
https://github.com/0xSAZZAD/Grafana-CVE-2021-43798
https://github.com/M0ge/CVE-2021-43798-grafana_fileread
https://github.com/JiuBanSec/Grafana-CVE-2021-43798
https://github.com/jas502n/Grafana-CVE-2021-43798
https://github.com/taythebot/CVE-2021-43798
https://github.com/BJLIYANLIANG/CVE-2021-43798-Grafana-File-Read
Something like 10 years ago, I noticed that if you looked at the commit counts on #Metasploit modules, you'd get a good idea of what modules people were actually using and wanting to improve. The idea being, these were modules that pentesters were actually using on site, and something about them bugged someone enough to put in a fix (maybe a missing target, or more options, or whatever).
I just looked again today after a conversation with @sawaba, and also looked at #Nuclei templates. Here's the top 10 of each, limited to the last 5 years worth of commits, excluding GitHub actions.
Whatcha think? Interesting?
exploits/multi/http/papercut_ng_auth_bypass.rb 38
exploits/multi/http/open_web_analytics_rce.rb 37
exploits/windows/local/bits_ntlm_token_impersonation.rb 37
exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb 32
exploits/linux/local/sudo_baron_samedit.rb 31
exploits/unix/webapp/openmediavault_rpc_rce.rb 29
exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb 28
exploits/linux/http/empire_skywalker.rb 28
exploits/multi/http/log4shell_header_injection.rb 26
exploits/windows/http/exchange_proxylogon_rce.rb 26
./http/cves/2019/CVE-2019-17382.yaml 27
./http/cves/2021/CVE-2021-40822.yaml 27
./http/cves/2023/CVE-2023-27034.yaml 27
./http/cves/2021/CVE-2021-43798.yaml 27
./http/cves/2023/CVE-2023-32243.yaml 27
./http/cves/2021/CVE-2021-40870.yaml 26
./network/cves/2016/CVE-2016-3510.yaml 26
./http/cves/2021/CVE-2021-28164.yaml 26
./network/cves/2020/CVE-2020-1938.yaml 26
./http/cves/2022/CVE-2022-23854.yaml 25
## updated 2024-01-06T05:06:00
1 posts
42 repos
https://github.com/khoaduynu/CVE-2021-40444
https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives
https://github.com/vysecurity/CVE-2021-40444
https://github.com/MohamedAboHelal/CVE-2021-40444
https://github.com/MRacumen/CVE-2021-40444
https://github.com/k8gege/CVE-2021-40444
https://github.com/DarkSprings/CVE-2021-40444
https://github.com/Immersive-Labs-Sec/cve-2021-40444-analysis
https://github.com/W1kyri3/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx
https://github.com/metehangenel/MSHTML-CVE-2021-40444
https://github.com/nvchungkma/CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-
https://github.com/k4k4/CVE-2021-40444-Sample
https://github.com/H0j3n/CVE-2021-40444
https://github.com/Phuong39/CVE-2021-40444-CAB
https://github.com/klezVirus/CVE-2021-40444
https://github.com/kagura-maru/CVE-2021-40444-POC
https://github.com/LazarusReborn/Docx-Exploit-2021
https://github.com/Zeop-CyberSec/word_mshtml
https://github.com/rfcxv/CVE-2021-40444-POC
https://github.com/tiagob0b/CVE-2021-40444
https://github.com/hqdat809/CVE-2021-40444
https://github.com/Alexcot25051999/CVE-2021-40444
https://github.com/jamesrep/cve-2021-40444
https://github.com/winstxnhdw/CVE-2022-30190
https://github.com/34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit
https://github.com/ozergoker/CVE-2021-40444
https://github.com/skitkat/CVE-2021-40444-POC
https://github.com/Ascotbe/Kernelhub
https://github.com/RedLeavesChilde/CVE-2021-40444
https://github.com/mansk1es/Caboom
https://github.com/aslitsecurity/CVE-2021-40444_builders
https://github.com/aydianosec/CVE2021-40444
https://github.com/basim-ahmad/Follina-CVE-and-CVE-2021-40444
https://github.com/fengjixuchui/CVE-2021-40444-docx-Generate
https://github.com/lisinan988/CVE-2021-40444-exp
https://github.com/KnoooW/CVE-2021-40444-docx-Generate
https://github.com/Edubr2020/CVE-2021-40444--CABless
https://github.com/Jeromeyoung/TIC4301_Project
https://github.com/bambooqj/CVE-2021-40444_EXP_JS
https://github.com/lockedbyte/CVE-2021-40444
https://github.com/InfoSecPolkCounty/CVE2021-40444-document-Scanner
updated 2023-08-31T05:03:29
1 posts
1 repos
Something like 10 years ago, I noticed that if you looked at the commit counts on #Metasploit modules, you'd get a good idea of what modules people were actually using and wanting to improve. The idea being, these were modules that pentesters were actually using on site, and something about them bugged someone enough to put in a fix (maybe a missing target, or more options, or whatever).
I just looked again today after a conversation with @sawaba, and also looked at #Nuclei templates. Here's the top 10 of each, limited to the last 5 years worth of commits, excluding GitHub actions.
Whatcha think? Interesting?
exploits/multi/http/papercut_ng_auth_bypass.rb 38
exploits/multi/http/open_web_analytics_rce.rb 37
exploits/windows/local/bits_ntlm_token_impersonation.rb 37
exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb 32
exploits/linux/local/sudo_baron_samedit.rb 31
exploits/unix/webapp/openmediavault_rpc_rce.rb 29
exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb 28
exploits/linux/http/empire_skywalker.rb 28
exploits/multi/http/log4shell_header_injection.rb 26
exploits/windows/http/exchange_proxylogon_rce.rb 26
./http/cves/2019/CVE-2019-17382.yaml 27
./http/cves/2021/CVE-2021-40822.yaml 27
./http/cves/2023/CVE-2023-27034.yaml 27
./http/cves/2021/CVE-2021-43798.yaml 27
./http/cves/2023/CVE-2023-32243.yaml 27
./http/cves/2021/CVE-2021-40870.yaml 26
./network/cves/2016/CVE-2016-3510.yaml 26
./http/cves/2021/CVE-2021-28164.yaml 26
./network/cves/2020/CVE-2020-1938.yaml 26
./http/cves/2022/CVE-2022-23854.yaml 25
## updated 2023-02-02T05:03:21
1 posts
4 repos
https://github.com/0xn0ne/weblogicScanner
https://github.com/minhangxiaohui/Weblogic_direct_T3_Rces
Something like 10 years ago, I noticed that if you looked at the commit counts on #Metasploit modules, you'd get a good idea of what modules people were actually using and wanting to improve. The idea being, these were modules that pentesters were actually using on site, and something about them bugged someone enough to put in a fix (maybe a missing target, or more options, or whatever).
I just looked again today after a conversation with @sawaba, and also looked at #Nuclei templates. Here's the top 10 of each, limited to the last 5 years worth of commits, excluding GitHub actions.
Whatcha think? Interesting?
exploits/multi/http/papercut_ng_auth_bypass.rb 38
exploits/multi/http/open_web_analytics_rce.rb 37
exploits/windows/local/bits_ntlm_token_impersonation.rb 37
exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb 32
exploits/linux/local/sudo_baron_samedit.rb 31
exploits/unix/webapp/openmediavault_rpc_rce.rb 29
exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb 28
exploits/linux/http/empire_skywalker.rb 28
exploits/multi/http/log4shell_header_injection.rb 26
exploits/windows/http/exchange_proxylogon_rce.rb 26
./http/cves/2019/CVE-2019-17382.yaml 27
./http/cves/2021/CVE-2021-40822.yaml 27
./http/cves/2023/CVE-2023-27034.yaml 27
./http/cves/2021/CVE-2021-43798.yaml 27
./http/cves/2023/CVE-2023-32243.yaml 27
./http/cves/2021/CVE-2021-40870.yaml 26
./network/cves/2016/CVE-2016-3510.yaml 26
./http/cves/2021/CVE-2021-28164.yaml 26
./network/cves/2020/CVE-2020-1938.yaml 26
./http/cves/2022/CVE-2022-23854.yaml 25
## updated 2023-02-01T05:05:22
1 posts
1 repos
Something like 10 years ago, I noticed that if you looked at the commit counts on #Metasploit modules, you'd get a good idea of what modules people were actually using and wanting to improve. The idea being, these were modules that pentesters were actually using on site, and something about them bugged someone enough to put in a fix (maybe a missing target, or more options, or whatever).
I just looked again today after a conversation with @sawaba, and also looked at #Nuclei templates. Here's the top 10 of each, limited to the last 5 years worth of commits, excluding GitHub actions.
Whatcha think? Interesting?
exploits/multi/http/papercut_ng_auth_bypass.rb 38
exploits/multi/http/open_web_analytics_rce.rb 37
exploits/windows/local/bits_ntlm_token_impersonation.rb 37
exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb 32
exploits/linux/local/sudo_baron_samedit.rb 31
exploits/unix/webapp/openmediavault_rpc_rce.rb 29
exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb 28
exploits/linux/http/empire_skywalker.rb 28
exploits/multi/http/log4shell_header_injection.rb 26
exploits/windows/http/exchange_proxylogon_rce.rb 26
./http/cves/2019/CVE-2019-17382.yaml 27
./http/cves/2021/CVE-2021-40822.yaml 27
./http/cves/2023/CVE-2023-27034.yaml 27
./http/cves/2021/CVE-2021-43798.yaml 27
./http/cves/2023/CVE-2023-32243.yaml 27
./http/cves/2021/CVE-2021-40870.yaml 26
./network/cves/2016/CVE-2016-3510.yaml 26
./http/cves/2021/CVE-2021-28164.yaml 26
./network/cves/2020/CVE-2020-1938.yaml 26
./http/cves/2022/CVE-2022-23854.yaml 25
## updated 2023-02-01T05:00:52
1 posts
1 repos
Something like 10 years ago, I noticed that if you looked at the commit counts on #Metasploit modules, you'd get a good idea of what modules people were actually using and wanting to improve. The idea being, these were modules that pentesters were actually using on site, and something about them bugged someone enough to put in a fix (maybe a missing target, or more options, or whatever).
I just looked again today after a conversation with @sawaba, and also looked at #Nuclei templates. Here's the top 10 of each, limited to the last 5 years worth of commits, excluding GitHub actions.
Whatcha think? Interesting?
exploits/multi/http/papercut_ng_auth_bypass.rb 38
exploits/multi/http/open_web_analytics_rce.rb 37
exploits/windows/local/bits_ntlm_token_impersonation.rb 37
exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb 32
exploits/linux/local/sudo_baron_samedit.rb 31
exploits/unix/webapp/openmediavault_rpc_rce.rb 29
exploits/linux/http/librenms_authenticated_rce_cve_2024_51092.rb 28
exploits/linux/http/empire_skywalker.rb 28
exploits/multi/http/log4shell_header_injection.rb 26
exploits/windows/http/exchange_proxylogon_rce.rb 26
./http/cves/2019/CVE-2019-17382.yaml 27
./http/cves/2021/CVE-2021-40822.yaml 27
./http/cves/2023/CVE-2023-27034.yaml 27
./http/cves/2021/CVE-2021-43798.yaml 27
./http/cves/2023/CVE-2023-32243.yaml 27
./http/cves/2021/CVE-2021-40870.yaml 26
./network/cves/2016/CVE-2016-3510.yaml 26
./http/cves/2021/CVE-2021-28164.yaml 26
./network/cves/2020/CVE-2020-1938.yaml 26
./http/cves/2022/CVE-2022-23854.yaml 25
## What the NULL?! Wing FTP Server RCE (CVE-2025-47812) https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/
##What the NULL?! Wing FTP Server RCE (CVE-2025-47812) https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/
##Thousands of Servers Still Vulnerable to Apache Struts RCE CVE-2025-1234
If you use Apache Airflow with Snowflake, assume you’re at risk until proven otherwise. 🛑 HOW THE EXPLOIT WORKS The vulnerability (CVE-2025-XXXXX) lets attackers inject malicious SQL through: Unsanitized stage names (@'attackers_stage') Unfiltered table parameters in CopyFromExternalStageToSnowflakeOperator Example attack payload: COPY INTO payroll_data FROM @'hacker_stage'PATTERN = '.'…
https://undercodenews.com/thousands-of-servers-still-vulnerable-to-apache-struts-rce-cve-2025-1234/
##⚠️ CRITICAL: CVE-2025-53091 impacts WeGIA <=3.3.3. Unauth time-based blind SQLi in 'almox' param of /controle/getProdutosPorAlmox.php—easy remote exploit, data at risk! Patch to 3.4.0+ ASAP. https://radar.offseq.com/threat/cve-2025-53091-cwe-89-improper-neutralization-of-s-ca59ad97 #OffSeq #SQLInjection #CVE202553091 #FOSS #CharitySecurity
##AMD posted this yesterday, relating to CVE-2024-21969: "Improper clearing of GPU registers could allow a malicious shader to read left-over pixel data leading to loss of confidentiality."
AMD: Uninitialized GPU Register Access, medium severity https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6013.html #cybersecurity #infosec #AMD
##Remote code execution in CentOS Web Panel - CVE-2025-48703 https://fenrisk.com/rce-centos-webpanel
##Pre-auth RCE in CentOS Web Panel (CVE-2025-48703) found by the friends at Fenrisk. This is beyond madness that Shodan finds 200k of these exposed publicly.
(this post is sponsored by strace®, because no one cares about ionCube)
##Two new Linux flaws (CVE-2025-6018, CVE-2025-6019) allow local attackers to escalate to root via PAM misconfig and udisks. Exploits confirmed on Ubuntu, Fedora, Debian. Admins urged to patch immediately.
##New critical Linux flaws let attackers escalate to root via PAM and udisks vulnerabilities
The first, CVE-2025-6018, impactsopenSUSE Leap 15andSUSE Linux Enterprise 15. The Qualys Threat Research Unit has disclosed two linked local privilege escalation vulnerabilities which affect a broad range ofLinuxsystems.
##Critical cryptographic flaw in Meshtastic Mesh Networking platform exposes private communications
Meshtastic, an open-source mesh networking solution for off-grid communication, has patched a critical vulnerability (CVE-2025-52464) that allowed attackers to decrypt private messages and hijack remote device administration due to identical cryptographic keys being shipped by manufacturers and poor randomness initialization. Users are urged to update to firmware version 2.6.11 or later and perform factory resets to eliminate potentially compromised keys.
**If you have Meshtastic devices, check the firmware. If it's 2.5.0 and above, it's very wise to update to firmware version 2.6.11 or later. Because attackers can read your private messages and take control of your devices. If possible, patch directly or reach out to your device manufacturer for a patch. After updating, perform a factory reset using "meshtastic --factory-reset-device" to clean up the old and potentially compromised encryption keys.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-cryptographic-flaw-in-meshtastic-mesh-networking-platform-exposes-private-communications-a-x-6-u-s/gD2P6Ple2L